Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
M_F+niestandardowy stempel.xlsx.exe

Overview

General Information

Sample name:M_F+niestandardowy stempel.xlsx.exe
Analysis ID:1430838
MD5:32ff58faa9596522b0062f2692b0d96a
SHA1:6b8206d5554c052e652b67af57b32ede5ceb5bd6
SHA256:64da1a2af5fbbd35867312aa68bfedd2dc695cf8bdac16e6974237226ebb8cc0
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Suspicious Double Extension File Execution
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • M_F+niestandardowy stempel.xlsx.exe (PID: 6696 cmdline: "C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe" MD5: 32FF58FAA9596522B0062F2692B0D96A)
    • conhost.exe (PID: 6784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • AddInProcess32.exe (PID: 2060 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • AddInProcess32.exe (PID: 5724 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • WerFault.exe (PID: 6804 cmdline: C:\Windows\system32\WerFault.exe -u -p 6696 -s 1076 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "webmail.zerotime.com.cy", "Username": "dvassis@zerotime.com.cy", "Password": "mbk627s320"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.2886508442.0000000002FEC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.2886508442.0000000002FF4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000002.00000002.2886508442.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 10 entries
              SourceRuleDescriptionAuthorStrings
              0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x31709:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x3177b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x31805:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x31897:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x31901:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x31973:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x31a09:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x31a99:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  2.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    2.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 10 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe", CommandLine: "C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe, NewProcessName: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe, OriginalFileName: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 6504, ProcessCommandLine: "C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe", ProcessId: 6696, ProcessName: M_F+niestandardowy stempel.xlsx.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 23.235.199.60, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, Initiated: true, ProcessId: 2060, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49733
                      Timestamp:04/24/24-09:46:07.222431
                      SID:2840032
                      Source Port:49733
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:04/24/24-09:46:07.222431
                      SID:2851779
                      Source Port:49733
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:04/24/24-09:46:07.222364
                      SID:2030171
                      Source Port:49733
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:04/24/24-09:46:07.222431
                      SID:2855542
                      Source Port:49733
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:04/24/24-09:46:07.222431
                      SID:2855245
                      Source Port:49733
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "webmail.zerotime.com.cy", "Username": "dvassis@zerotime.com.cy", "Password": "mbk627s320"}

                      Exploits

                      barindex
                      Source: Yara matchFile source: 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: M_F+niestandardowy stempel.xlsx.exe PID: 6696, type: MEMORYSTR
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: System.pdb(` source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdbRSDS source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.pdbMZ source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb- source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb`c source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdb source: WERA9A1.tmp.dmp.6.dr

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49733 -> 23.235.199.60:587
                      Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49733 -> 23.235.199.60:587
                      Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49733 -> 23.235.199.60:587
                      Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49733 -> 23.235.199.60:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49733 -> 23.235.199.60:587
                      Source: global trafficTCP traffic: 192.168.2.4:49733 -> 23.235.199.60:587
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewASN Name: INMOTI-1US INMOTI-1US
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.4:49733 -> 23.235.199.60:587
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: api.ipify.org
                      Source: AddInProcess32.exe, 00000002.00000002.2886508442.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                      Source: AddInProcess32.exe, 00000002.00000002.2886508442.0000000002FEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://webmail.zerotime.com.cy
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2886508442.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: AddInProcess32.exe, 00000002.00000002.2886508442.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: AddInProcess32.exe, 00000002.00000002.2886508442.0000000002F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, NmHr1WHWKO.cs.Net Code: FMeFrKvz
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.raw.unpack, NmHr1WHWKO.cs.Net Code: FMeFrKvz

                      System Summary

                      barindex
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B89EBF80_2_00007FFD9B89EBF8
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8A94300_2_00007FFD9B8A9430
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8AC3AD0_2_00007FFD9B8AC3AD
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8943090_2_00007FFD9B894309
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8929A10_2_00007FFD9B8929A1
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8A60580_2_00007FFD9B8A6058
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8A60500_2_00007FFD9B8A6050
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8A1D880_2_00007FFD9B8A1D88
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B891DD80_2_00007FFD9B891DD8
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B89CE190_2_00007FFD9B89CE19
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B89246D0_2_00007FFD9B89246D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F3E2712_2_02F3E271
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F34A982_2_02F34A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F3D9902_2_02F3D990
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F33E802_2_02F33E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F341C82_2_02F341C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F3A9582_2_02F3A958
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690A1782_2_0690A178
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690BA002_2_0690BA00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_069155A02_2_069155A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_069165E82_2_069165E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0691B2282_2_0691B228
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_069130502_2_06913050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0691C1802_2_0691C180
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_06917D782_2_06917D78
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_069176982_2_06917698
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0691E3A02_2_0691E3A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_069100402_2_06910040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_06915CDF2_2_06915CDF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_069100062_2_06910006
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_069105802_2_06910580
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6696 -s 1076
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic PE information: No import functions for PE file found
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000000.1635108223.000001FE21582000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUruyalager> vs M_F+niestandardowy stempel.xlsx.exe
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename5052eb0c-ef87-4c36-aa75-8cdfdaca4381.exe4 vs M_F+niestandardowy stempel.xlsx.exe
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAmifebakayimejayF vs M_F+niestandardowy stempel.xlsx.exe
                      Source: M_F+niestandardowy stempel.xlsx.exeBinary or memory string: OriginalFilenameUruyalager> vs M_F+niestandardowy stempel.xlsx.exe
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: M_F+niestandardowy stempel.xlsx.exe, HasElementTypeMyVideos.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                      Source: M_F+niestandardowy stempel.xlsx.exe, RemoveEventHandlerSetUser.csTask registration methods: 'CreateInstanceAndUnwrapIConfiguredTaskAwaiter'
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@7/5@2/2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6784:120:WilError_03
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6696
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\20e6896f-ace9-447a-a023-9a33ec1ab8ecJump to behavior
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeFile read: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe "C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe"
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6696 -s 1076
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: System.pdb(` source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdbRSDS source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.pdbMZ source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb- source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: mscorlib.pdb`c source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.ni.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: Binary string: System.Core.ni.pdb source: WERA9A1.tmp.dmp.6.dr
                      Source: M_F+niestandardowy stempel.xlsx.exeStatic PE information: 0x9EA20D34 [Sun May 3 11:25:40 2054 UTC]
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8A592C push ebx; retf 0_2_00007FFD9B8A59DA
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B8A5815 push ebx; retf 0_2_00007FFD9B8A59DA
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeCode function: 0_2_00007FFD9B98026B push esp; retf 4810h0_2_00007FFD9B980312
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F3A229 pushfd ; retf 054Ah2_2_02F3A6A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F30C95 push edi; retf 2_2_02F30C3A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_02F30C3D push edi; ret 2_2_02F30CC2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB99 push es; iretd 2_2_0690FBC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FBDD push es; iretd 2_2_0690FBE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FBC9 push es; iretd 2_2_0690FBCC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FBCD push es; iretd 2_2_0690FBDC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB10 push es; iretd 2_2_0690FB20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB21 push es; iretd 2_2_0690FB24
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB55 push es; iretd 2_2_0690FB5C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB44 push es; iretd 2_2_0690FB54
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB71 push es; iretd 2_2_0690FB7C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB7D push es; iretd 2_2_0690FB88
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690FB6D push es; iretd 2_2_0690FB70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690D89F push cs; ret 2_2_0690D8A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 2_2_0690D88A push cs; ret 2_2_0690D88C

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: Possible double extension: xlsx.exeStatic PE information: M_F+niestandardowy stempel.xlsx.exe
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: M_F+niestandardowy stempel.xlsx.exe PID: 6696, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory allocated: 1FE230E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory allocated: 1FE3B140000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2F30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2F70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 4F70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 1266Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 3216Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7260Thread sleep count: 1266 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99875s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99765s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99656s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7260Thread sleep count: 3216 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99547s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99437s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99328s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99219s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -99094s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98984s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98875s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98765s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98656s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98547s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98437s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98328s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98219s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -98094s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -97984s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -97875s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -97765s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -97656s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7252Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99765Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99547Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99437Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99328Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99219Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98984Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98765Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98547Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98437Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98328Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98219Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97984Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97765Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 97656Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Amcache.hve.6.drBinary or memory string: VMware
                      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                      Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                      Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: AddInProcess32.exe, 00000002.00000002.2890557949.0000000006263000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
                      Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                      Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: M_F+niestandardowy stempel.xlsx.exeBinary or memory string: FUNCPUREVIRTUALMachine
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                      Source: M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                      Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: M_F+niestandardowy stempel.xlsx.exe, HasElementTypeMyVideos.csReference to suspicious API methods: ((CaseSensitiveCanceled)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(ThreadingKeywordopAddition(getSourceReleaseAllResources.getDefaultThreadCurrentUICultureGlobalCount)), ThreadingKeywordopAddition(getSourceReleaseAllResources.EmitCallIModulusOperators3)), typeof(CaseSensitiveCanceled)))("Pointer", out var _)
                      Source: M_F+niestandardowy stempel.xlsx.exe, HasElementTypeMyVideos.csReference to suspicious API methods: ((CaseSensitiveCanceled)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(ThreadingKeywordopAddition(getSourceReleaseAllResources.getDefaultThreadCurrentUICultureGlobalCount)), ThreadingKeywordopAddition(getSourceReleaseAllResources.EmitCallIModulusOperators3)), typeof(CaseSensitiveCanceled)))("Pointer", out var _)
                      Source: M_F+niestandardowy stempel.xlsx.exe, HasElementTypeMyVideos.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)array.Length, 64u, out var MultiplyAddAdjacentTranscodingStream)
                      Source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, k4Pbu.csReference to suspicious API methods: _4Vbl.OpenProcess(mxMeagYTS.DuplicateHandle, bInheritHandle: true, (uint)uq7wFEAU2.ProcessID)
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 43C000Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: ED3008Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeQueries volume information: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.2886508442.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2886508442.0000000002FF4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2886508442.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: M_F+niestandardowy stempel.xlsx.exe PID: 6696, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 2060, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2886508442.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: M_F+niestandardowy stempel.xlsx.exe PID: 6696, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 2060, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe331bf788.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.M_F+niestandardowy stempel.xlsx.exe.1fe33184d40.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.2886508442.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2886508442.0000000002FF4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2886508442.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: M_F+niestandardowy stempel.xlsx.exe PID: 6696, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 2060, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      Scheduled Task/Job
                      211
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Scheduled Task/Job
                      Logon Script (Windows)1
                      Scheduled Task/Job
                      11
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      231
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Timestomp
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model1
                      Input Capture
                      2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets151
                      Virtualization/Sandbox Evasion
                      SSHKeylogging23
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                      Virtualization/Sandbox Evasion
                      DCSync1
                      System Network Configuration Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                      Process Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      M_F+niestandardowy stempel.xlsx.exe8%ReversingLabsWin64.Infostealer.Generic
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      webmail.zerotime.com.cy0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://webmail.zerotime.com.cy0%Avira URL Cloudsafe
                      http://webmail.zerotime.com.cy0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ipify.org
                      172.67.74.152
                      truefalse
                        high
                        webmail.zerotime.com.cy
                        23.235.199.60
                        truetrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgM_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2886508442.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            http://upx.sf.netAmcache.hve.6.drfalse
                              high
                              https://account.dyn.com/M_F+niestandardowy stempel.xlsx.exe, 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                https://api.ipify.org/tAddInProcess32.exe, 00000002.00000002.2886508442.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://webmail.zerotime.com.cyAddInProcess32.exe, 00000002.00000002.2886508442.0000000002FEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAddInProcess32.exe, 00000002.00000002.2886508442.0000000002F71000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    23.235.199.60
                                    webmail.zerotime.com.cyUnited States
                                    54641INMOTI-1UStrue
                                    172.67.74.152
                                    api.ipify.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1430838
                                    Start date and time:2024-04-24 09:45:07 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 58s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:11
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:M_F+niestandardowy stempel.xlsx.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.expl.evad.winEXE@7/5@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 87%
                                    • Number of executed functions: 75
                                    • Number of non-executed functions: 8
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 13.89.179.12
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                    TimeTypeDescription
                                    09:46:03API Interceptor22x Sleep call for process: AddInProcess32.exe modified
                                    09:46:16API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    172.67.74.152Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                    • api.ipify.org/?format=json
                                    Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/?format=json
                                    Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/?format=json
                                    Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                    • api.ipify.org/?format=json
                                    Sky-Beta.exeGet hashmaliciousStealitBrowse
                                    • api.ipify.org/?format=json
                                    SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/?format=json
                                    SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/?format=json
                                    Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/?format=json
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    api.ipify.orgresponsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.12.205
                                    F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                    • 104.26.12.205
                                    New DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    hesaphareketi_1.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    DHL Shipping doc.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 104.26.13.205
                                    purchase order pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.12.205
                                    PO 23JC0704-Rollease-B.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.74.152
                                    SecuriteInfo.com.Python.Stealer.1437.14994.32063.exeGet hashmaliciousPython StealerBrowse
                                    • 172.67.74.152
                                    https://wmicrosouab-4ba8.udydzj.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                    • 104.26.13.205
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    INMOTI-1UShttp://x-elon.fyiGet hashmaliciousGRQ ScamBrowse
                                    • 173.231.220.79
                                    KZWCMNWmmqi9lvI.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.46.88.214
                                    tmjGCGOEGMinVPD.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.46.88.214
                                    eTo4MkEQvX.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.46.88.214
                                    Quotation[MPI-240401.exeGet hashmaliciousAgentTeslaBrowse
                                    • 198.46.88.214
                                    https://gcv.microsoft.us/kgRWagmalJGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                    • 173.231.215.6
                                    http://bookkeepers.com/Get hashmaliciousUnknownBrowse
                                    • 199.250.194.144
                                    http://bookkeepers.comGet hashmaliciousUnknownBrowse
                                    • 199.250.194.144
                                    http://aitcaid.comGet hashmaliciousUnknownBrowse
                                    • 199.250.194.144
                                    fuggy.vbsGet hashmaliciousGuLoader, XWormBrowse
                                    • 144.208.78.130
                                    CLOUDFLARENETUSrq0mVjR9ar.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                    • 172.67.139.220
                                    https://220420241.blob.core.windows.net/web/index.html?id=999Get hashmaliciousUnknownBrowse
                                    • 1.1.1.1
                                    responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.12.205
                                    https://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DU_vL_MRfqZW9nS4IDBSHT8MfJfSAq9b0aOVvtJoUhpW1Ga8ePAnfV-2FfXwE0xIGnayeXag21qNKRc5VLcgMkPlIuCBf7Hi8EFUvj1-2FlklJpMLZNx1IQq8eO26tVdmeuxhGn-2B2zjA71oEkiC9pTrxX9Dz-2FMJk8mkJr62ye1KlBo-2B8fxBlVl-2B6T0POpB0GKoibGhcjh4Z-2FnPU453nMAkUkNy65MlaA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                    • 104.17.2.184
                                    iwjvkEAIQa.rtfGet hashmaliciousUnknownBrowse
                                    • 172.67.187.200
                                    8jvTeVxooN.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                    • 172.67.139.220
                                    xF3wienia PO2102559-1.xlsxGet hashmaliciousUnknownBrowse
                                    • 172.67.215.45
                                    https://tibusiness.cl/css/causarol.rarGet hashmaliciousUnknownBrowse
                                    • 1.1.1.1
                                    F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                    • 104.26.12.205
                                    http://damarltda.cl/certificado.phpGet hashmaliciousUnknownBrowse
                                    • 162.159.61.3
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0ehttps://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DU_vL_MRfqZW9nS4IDBSHT8MfJfSAq9b0aOVvtJoUhpW1Ga8ePAnfV-2FfXwE0xIGnayeXag21qNKRc5VLcgMkPlIuCBf7Hi8EFUvj1-2FlklJpMLZNx1IQq8eO26tVdmeuxhGn-2B2zjA71oEkiC9pTrxX9Dz-2FMJk8mkJr62ye1KlBo-2B8fxBlVl-2B6T0POpB0GKoibGhcjh4Z-2FnPU453nMAkUkNy65MlaA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                    • 172.67.74.152
                                    F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                    • 172.67.74.152
                                    New DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.74.152
                                    hesaphareketi_1.scr.exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.74.152
                                    e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.74.152
                                    e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 172.67.74.152
                                    DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 172.67.74.152
                                    transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 172.67.74.152
                                    1000901 LIQUIDACION.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                    • 172.67.74.152
                                    Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 172.67.74.152
                                    No context
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.014524131062362
                                    Encrypted:false
                                    SSDEEP:192:wS6QZPM50UnUFaWBHah1zuiFGZ24lO8Fh:YEPhUnUFamHazzuiFGY4lO8Fh
                                    MD5:AB1DB9CCF7AB5714C56851E5CFF96710
                                    SHA1:3F57026696565742BBDF137FE2E3140AAABB34C0
                                    SHA-256:525EAD67D6E84BDB17701C471455D5AA39D3C081A7FF66E992624E0AA24AF3CB
                                    SHA-512:C78E3852A47A8E5BD0B0021D688E396C6153AC247DE8919F54E8EC2D94C1D1087740D3F559DC544142B7FC8BCD8A12551C797BD97C07A6B25B36FFE95E8C9D17
                                    Malicious:false
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.4.1.8.3.6.2.1.7.7.2.5.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.4.1.8.3.6.2.8.6.4.7.6.9.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.1.c.0.5.6.9.-.d.e.d.8.-.4.6.0.9.-.a.8.4.7.-.4.9.8.4.5.e.6.b.e.d.d.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.2.d.1.e.1.5.c.-.7.5.b.e.-.4.c.b.9.-.9.2.c.c.-.d.f.2.4.9.a.4.4.b.f.7.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.M._.F.+.n.i.e.s.t.a.n.d.a.r.d.o.w.y. .s.t.e.m.p.e.l...x.l.s.x...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.r.u.y.a.l.a.g.e.r.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.2.8.-.0.0.0.1.-.0.0.1.4.-.d.8.5.2.-.2.f.7.3.1.b.9.6.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.7.c.f.0.d.8.4.5.a.f.4.b.b.7.3.f.d.2.c.3.e.8.a.7.5.a.7.8.8.6.8.0.0.0.0.0.0.0.0.!.0.0.0.0.6.b.8.2.0.6.d.5.5.5.4.c.0.5.2.e.6.5.2.b.6.7.a.f.5.7.b.3.2.e.d.e.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:Mini DuMP crash report, 16 streams, Wed Apr 24 07:46:02 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):436083
                                    Entropy (8bit):3.2911168037602305
                                    Encrypted:false
                                    SSDEEP:3072:llVeqrlFz0q4LmzcSPiWJu1CCqjdqZ4UU33+v6TQVp3u4:lWQRiqkZG3QGQ3
                                    MD5:BC029556A686A5B966A27B86E3E81F2E
                                    SHA1:1A0A514AC1D4548C0422E79249C9E8B618CB1AEE
                                    SHA-256:7A9CE77692C6D77C32C509BD17C6012D2FCB068B012F8800265D98BA2D700230
                                    SHA-512:5DF2BCBC6EA8E77604A35E39DED8A699FB06A1AE12901A58527C252839DA4C3ACCB23B1D73E9B0D285CE129AD334737F77FC859F6ECF00C134A8181D55880DD9
                                    Malicious:false
                                    Reputation:low
                                    Preview:MDMP..a..... .........(f............D...............d.......$...d........ ..........4O.............l.......8...........T...........h*...}...........=...........>..............................................................................eJ.......?......Lw......................T.......(.....(f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8690
                                    Entropy (8bit):3.708899833939323
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJOiU6Y96kXgmf76Jopr+89b7KCfVCvJm:R6lXJzU6YgkXgmf7ia7/fP
                                    MD5:9736798F7917B7D742A43EC908370D21
                                    SHA1:6811D83B6522628FACF002B06DC9E876DE8152F9
                                    SHA-256:900EB7ABD912844187A7EA58A8684667610BE4A09EBACE4A5EB1BC58CF3E02E2
                                    SHA-512:A5D287AEDF0649B152E2FB4308C01CFD6F21C109989D12887EF97B8EA3DE9928B1BEDDB9AB0844529C6A08BA8D91362B35D6BE087F30C905D0C309E4FAEB1213
                                    Malicious:false
                                    Reputation:low
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.9.6.<./.P.i.
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4865
                                    Entropy (8bit):4.542186129129582
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsCJg771I9daWpW8VYFYm8M4JVwmAFcyq851IXCA8rVgrd:uIjfQI7Ob7V9JVLqJAWVgrd
                                    MD5:7B015B86F9DC879E04941E9651D32C0B
                                    SHA1:8F5C2137037C817A1596A8F2D4A0E7341DBB2B31
                                    SHA-256:1FF18FE94CAF2383873E952FE2E91B1A4C6879F64F0D6DE7C01B634DC0971DED
                                    SHA-512:04DEFE1CE5C46A368B8925ED49F3598220365E78C762A4C126E0F431375283586EB1B441EE2E7562245808ED7E8072AAF76FC9A42C85FBA74C433F6C9CD480A4
                                    Malicious:false
                                    Reputation:low
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293688" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\System32\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.466063320975219
                                    Encrypted:false
                                    SSDEEP:6144:IIXfpi67eLPU9skLmb0b4YWSPKaJG8nAgejZMMhA2gX4WABl0uNSdwBCswSbM:dXD94YWlLZMM6YFHY+M
                                    MD5:80CFE681B4F45C2CEC62DA6C96BB8BC7
                                    SHA1:C3329AAF02924623B46358445F4C8F9CC06585D7
                                    SHA-256:E8BF423898BDABE893B006508720D3765F90DB84777F58AFB6C741E254A47F9A
                                    SHA-512:B522BFC8A95E0329F160C5594A508730D7AE199472407BB7A48D64D3B481FB4DF637A20CED8CE336A466EAFB8D5B1732E797EFE2D9F1F1901415B639E8E45071
                                    Malicious:false
                                    Reputation:low
                                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&uLt.................................................................................................................................................................................................................................................................................................................................................yZ@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.426781616516859
                                    TrID:
                                    • Win64 Executable Console Net Framework (206006/5) 48.58%
                                    • Win64 Executable Console (202006/5) 47.64%
                                    • Win64 Executable (generic) (12005/4) 2.83%
                                    • Generic Win/DOS Executable (2004/3) 0.47%
                                    • DOS Executable Generic (2002/1) 0.47%
                                    File name:M_F+niestandardowy stempel.xlsx.exe
                                    File size:1'014'893 bytes
                                    MD5:32ff58faa9596522b0062f2692b0d96a
                                    SHA1:6b8206d5554c052e652b67af57b32ede5ceb5bd6
                                    SHA256:64da1a2af5fbbd35867312aa68bfedd2dc695cf8bdac16e6974237226ebb8cc0
                                    SHA512:4d47708e17cebc4cbfc1b38b386087e4b13a3aa12b842d2e2c8001cfaac9f81bc2d9975d2b240718a435d33ca7dca060eeb441457bdd0ff6062424cf5bdeb324
                                    SSDEEP:24576:g0QxZr8OxebDlnyLqZOV/r47BOhqT8Nxg:gtr8O0bBJOp47qJg
                                    TLSH:EF25BF5273F8156AF7FB4B78A87466445EF6FED22A41FA9C5840C10E0C62F8099693F3
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...4............."...0.H2............... ....@...... ....................................`................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x400000
                                    Entrypoint Section:
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows cui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x9EA20D34 [Sun May 3 11:25:40 2054 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:
                                    Instruction
                                    dec ebp
                                    pop edx
                                    nop
                                    add byte ptr [ebx], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x660000xb04.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x651920x38.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x632480x634004115f4ad36f8de40afeb6da516ea352aFalse0.33515034634760704data5.512947353382107IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x660000xb040xc007fd8bc10a933f78efb29085410639568False0.2825520833333333data4.289010697698533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x660b80x430data0.4869402985074627
                                    RT_VERSION0x664e80x430dataEnglishUnited States0.4869402985074627
                                    RT_MANIFEST0x669180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    04/24/24-09:46:07.222431TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249733587192.168.2.423.235.199.60
                                    04/24/24-09:46:07.222431TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49733587192.168.2.423.235.199.60
                                    04/24/24-09:46:07.222364TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49733587192.168.2.423.235.199.60
                                    04/24/24-09:46:07.222431TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49733587192.168.2.423.235.199.60
                                    04/24/24-09:46:07.222431TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49733587192.168.2.423.235.199.60
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 24, 2024 09:46:03.750829935 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:03.750915051 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:03.751000881 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:03.760715008 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:03.760786057 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:04.099401951 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:04.099522114 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:04.103116989 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:04.103151083 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:04.103569031 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:04.157160997 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:04.253047943 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:04.300123930 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:04.543179035 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:04.543328047 CEST44349730172.67.74.152192.168.2.4
                                    Apr 24, 2024 09:46:04.543404102 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:04.549958944 CEST49730443192.168.2.4172.67.74.152
                                    Apr 24, 2024 09:46:05.337100029 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:05.556057930 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:05.556162119 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:05.885828018 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:05.886177063 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:06.105417967 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:06.106548071 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:06.330456018 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:06.330763102 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:06.554932117 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:06.555237055 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:06.773108959 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:06.773406982 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:07.003300905 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:07.003572941 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:07.221607924 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:07.221647978 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:07.222363949 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:07.222430944 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:07.222459078 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:07.222482920 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:46:07.440509081 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:07.440804958 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:07.442172050 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:46:07.485315084 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:47:45.079394102 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:47:45.337261915 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:47:45.503002882 CEST5874973323.235.199.60192.168.2.4
                                    Apr 24, 2024 09:47:45.503154039 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:47:45.503267050 CEST49733587192.168.2.423.235.199.60
                                    Apr 24, 2024 09:47:45.722826958 CEST5874973323.235.199.60192.168.2.4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 24, 2024 09:46:03.585136890 CEST4945353192.168.2.41.1.1.1
                                    Apr 24, 2024 09:46:03.739792109 CEST53494531.1.1.1192.168.2.4
                                    Apr 24, 2024 09:46:05.064358950 CEST5854753192.168.2.41.1.1.1
                                    Apr 24, 2024 09:46:05.335910082 CEST53585471.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Apr 24, 2024 09:46:03.585136890 CEST192.168.2.41.1.1.10xbad6Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                    Apr 24, 2024 09:46:05.064358950 CEST192.168.2.41.1.1.10x2ab1Standard query (0)webmail.zerotime.com.cyA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Apr 24, 2024 09:46:03.739792109 CEST1.1.1.1192.168.2.40xbad6No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                    Apr 24, 2024 09:46:03.739792109 CEST1.1.1.1192.168.2.40xbad6No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                    Apr 24, 2024 09:46:03.739792109 CEST1.1.1.1192.168.2.40xbad6No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                    Apr 24, 2024 09:46:05.335910082 CEST1.1.1.1192.168.2.40x2ab1No error (0)webmail.zerotime.com.cy23.235.199.60A (IP address)IN (0x0001)false
                                    • api.ipify.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.449730172.67.74.1524432060C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                    TimestampBytes transferredDirectionData
                                    2024-04-24 07:46:04 UTC155OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                    Host: api.ipify.org
                                    Connection: Keep-Alive
                                    2024-04-24 07:46:04 UTC211INHTTP/1.1 200 OK
                                    Date: Wed, 24 Apr 2024 07:46:04 GMT
                                    Content-Type: text/plain
                                    Content-Length: 13
                                    Connection: close
                                    Vary: Origin
                                    CF-Cache-Status: DYNAMIC
                                    Server: cloudflare
                                    CF-RAY: 87947a395a5adbd1-LAX
                                    2024-04-24 07:46:04 UTC13INData Raw: 31 35 34 2e 31 36 2e 31 30 35 2e 33 36
                                    Data Ascii: 154.16.105.36


                                    TimestampSource PortDest PortSource IPDest IPCommands
                                    Apr 24, 2024 09:46:05.885828018 CEST5874973323.235.199.60192.168.2.4220-ecres336.servconfig.com ESMTP Exim 4.96.2 #2 Wed, 24 Apr 2024 03:46:05 -0400
                                    220-We do not authorize the use of this system to transport unsolicited,
                                    220 and/or bulk e-mail.
                                    Apr 24, 2024 09:46:05.886177063 CEST49733587192.168.2.423.235.199.60EHLO 721680
                                    Apr 24, 2024 09:46:06.105417967 CEST5874973323.235.199.60192.168.2.4250-ecres336.servconfig.com Hello 721680 [154.16.105.36]
                                    250-SIZE 52428800
                                    250-8BITMIME
                                    250-PIPELINING
                                    250-PIPECONNECT
                                    250-AUTH PLAIN LOGIN
                                    250-CHUNKING
                                    250-STARTTLS
                                    250 HELP
                                    Apr 24, 2024 09:46:06.106548071 CEST49733587192.168.2.423.235.199.60AUTH login ZHZhc3Npc0B6ZXJvdGltZS5jb20uY3k=
                                    Apr 24, 2024 09:46:06.330456018 CEST5874973323.235.199.60192.168.2.4334 UGFzc3dvcmQ6
                                    Apr 24, 2024 09:46:06.554932117 CEST5874973323.235.199.60192.168.2.4235 Authentication succeeded
                                    Apr 24, 2024 09:46:06.555237055 CEST49733587192.168.2.423.235.199.60MAIL FROM:<dvassis@zerotime.com.cy>
                                    Apr 24, 2024 09:46:06.773108959 CEST5874973323.235.199.60192.168.2.4250 OK
                                    Apr 24, 2024 09:46:06.773406982 CEST49733587192.168.2.423.235.199.60RCPT TO:<nolimitforce@yandex.com>
                                    Apr 24, 2024 09:46:07.003300905 CEST5874973323.235.199.60192.168.2.4250 Accepted
                                    Apr 24, 2024 09:46:07.003572941 CEST49733587192.168.2.423.235.199.60DATA
                                    Apr 24, 2024 09:46:07.221647978 CEST5874973323.235.199.60192.168.2.4354 Enter message, ending with "." on a line by itself
                                    Apr 24, 2024 09:46:07.222482920 CEST49733587192.168.2.423.235.199.60.
                                    Apr 24, 2024 09:46:07.442172050 CEST5874973323.235.199.60192.168.2.4250 OK id=1rzXKR-004qnX-0N
                                    Apr 24, 2024 09:47:45.079394102 CEST49733587192.168.2.423.235.199.60QUIT
                                    Apr 24, 2024 09:47:45.503002882 CEST5874973323.235.199.60192.168.2.4221 ecres336.servconfig.com closing connection

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:09:46:00
                                    Start date:24/04/2024
                                    Path:C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\M_F+niestandardowy stempel.xlsx.exe"
                                    Imagebase:0x1fe21580000
                                    File size:1'014'893 bytes
                                    MD5 hash:32FF58FAA9596522B0062F2692B0D96A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1814357877.000001FE23185000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1816336840.000001FE33147000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:09:46:00
                                    Start date:24/04/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:09:46:01
                                    Start date:24/04/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                    Imagebase:0xce0000
                                    File size:43'008 bytes
                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2886508442.0000000002FEC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2885370305.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2886508442.0000000002FF4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2886508442.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2886508442.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:moderate
                                    Has exited:false

                                    Target ID:3
                                    Start time:09:46:01
                                    Start date:24/04/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                    Imagebase:0xee0000
                                    File size:43'008 bytes
                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:6
                                    Start time:09:46:01
                                    Start date:24/04/2024
                                    Path:C:\Windows\System32\WerFault.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 6696 -s 1076
                                    Imagebase:0x7ff7605c0000
                                    File size:570'736 bytes
                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:9.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:52
                                      Total number of Limit Nodes:0
                                      execution_graph 19614 7ffd9b8a0519 19615 7ffd9b8a052f 19614->19615 19618 7ffd9b89fcb0 19615->19618 19620 7ffd9b89fcd0 19618->19620 19619 7ffd9b89fe74 LoadLibraryA 19619->19620 19620->19619 19621 7ffd9b89fd1f 19620->19621 19642 7ffd9b8908bd 19643 7ffd9b8908cf FreeConsole 19642->19643 19645 7ffd9b89094e 19643->19645 19626 7ffd9b89e19d 19627 7ffd9b89e1a7 19626->19627 19638 7ffd9b890db0 19627->19638 19630 7ffd9b890db0 LoadLibraryA 19631 7ffd9b89e228 19630->19631 19632 7ffd9b890db0 LoadLibraryA 19631->19632 19633 7ffd9b89e23d 19632->19633 19634 7ffd9b890db0 LoadLibraryA 19633->19634 19635 7ffd9b89e2da 19634->19635 19636 7ffd9b890db0 LoadLibraryA 19635->19636 19637 7ffd9b89e2ef 19636->19637 19639 7ffd9b89fcb0 19638->19639 19640 7ffd9b89fe74 LoadLibraryA 19639->19640 19641 7ffd9b89e207 19639->19641 19640->19639 19641->19630 19670 7ffd9b89fc91 19672 7ffd9b89fc9b 19670->19672 19671 7ffd9b89fe74 LoadLibraryA 19671->19672 19672->19671 19673 7ffd9b89fd1f 19672->19673 19622 7ffd9b8a02b4 19623 7ffd9b8a02bd VirtualProtect 19622->19623 19625 7ffd9b8a0381 19623->19625 19646 7ffd9b8a03b4 19647 7ffd9b8a03bd 19646->19647 19648 7ffd9b89fcb0 LoadLibraryA 19647->19648 19649 7ffd9b8a0403 19648->19649 19666 7ffd9b890db8 19649->19666 19652 7ffd9b89fcb0 LoadLibraryA 19653 7ffd9b8a0439 19652->19653 19654 7ffd9b890db8 LoadLibraryA 19653->19654 19655 7ffd9b8a045b 19654->19655 19656 7ffd9b89fcb0 LoadLibraryA 19655->19656 19657 7ffd9b8a0468 19656->19657 19658 7ffd9b890db8 LoadLibraryA 19657->19658 19659 7ffd9b8a04a7 19658->19659 19660 7ffd9b89fcb0 LoadLibraryA 19659->19660 19661 7ffd9b8a04b4 19660->19661 19662 7ffd9b890db8 LoadLibraryA 19661->19662 19663 7ffd9b8a04d6 19662->19663 19664 7ffd9b89fcb0 LoadLibraryA 19663->19664 19665 7ffd9b8a04e3 19664->19665 19667 7ffd9b8a0530 19666->19667 19668 7ffd9b89fcb0 LoadLibraryA 19667->19668 19669 7ffd9b8a042c 19668->19669 19669->19652

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 7ffd9b891dd8-7ffd9b8965c7 2 7ffd9b896608-7ffd9b896618 0->2 3 7ffd9b8965c9-7ffd9b896601 0->3 5 7ffd9b89662a-7ffd9b896648 2->5 6 7ffd9b89661a 2->6 3->2 7 7ffd9b89661b-7ffd9b896629 5->7 11 7ffd9b89664a-7ffd9b896726 call 7ffd9b891d08 call 7ffd9b890218 5->11 6->7 21 7ffd9b89672b-7ffd9b8985a3 call 7ffd9b890218 * 223 call 7ffd9b891e68 11->21 473 7ffd9b89c1a6-7ffd9b89c1f2 21->473 474 7ffd9b8985a9-7ffd9b898603 call 7ffd9b891e68 21->474 486 7ffd9b89c1ff-7ffd9b89c229 473->486 487 7ffd9b89c1f4-7ffd9b89c1fe 473->487 474->473 478 7ffd9b898609-7ffd9b89865f call 7ffd9b891e68 474->478 478->473 484 7ffd9b898665-7ffd9b8986bc call 7ffd9b891e68 478->484 484->473 490 7ffd9b8986c2-7ffd9b898718 call 7ffd9b891e68 484->490 491 7ffd9b89c22b-7ffd9b89c230 486->491 492 7ffd9b89c232-7ffd9b89c233 486->492 490->473 496 7ffd9b89871e-7ffd9b898774 call 7ffd9b891e68 490->496 494 7ffd9b89c236-7ffd9b89c249 491->494 492->494 499 7ffd9b89c26a-7ffd9b89c27f 494->499 500 7ffd9b89c24b-7ffd9b89c268 494->500 496->473 504 7ffd9b89877a-7ffd9b8987d6 call 7ffd9b891e68 496->504 500->499 504->473 507 7ffd9b8987dc-7ffd9b89883c call 7ffd9b891e68 504->507 507->473 510 7ffd9b898842-7ffd9b8988a4 call 7ffd9b891e68 507->510 510->473 513 7ffd9b8988aa-7ffd9b89890d call 7ffd9b891e68 510->513 513->473 516 7ffd9b898913-7ffd9b898975 call 7ffd9b891e68 513->516 516->473 519 7ffd9b89897b-7ffd9b8989de call 7ffd9b891e68 516->519 519->473 522 7ffd9b8989e4-7ffd9b898a47 call 7ffd9b891e68 519->522 522->473 525 7ffd9b898a4d-7ffd9b898ab3 call 7ffd9b891e68 522->525 525->473 528 7ffd9b898ab9-7ffd9b898b1c call 7ffd9b891e68 525->528 528->473 531 7ffd9b898b22-7ffd9b898b85 call 7ffd9b891e68 528->531 531->473 534 7ffd9b898b8b-7ffd9b898bee call 7ffd9b891e68 531->534 534->473 537 7ffd9b898bf4-7ffd9b898c57 call 7ffd9b891e68 534->537 537->473 540 7ffd9b898c5d-7ffd9b898cc0 call 7ffd9b891e68 537->540 540->473 543 7ffd9b898cc6-7ffd9b898d29 call 7ffd9b891e68 540->543 543->473 546 7ffd9b898d2f-7ffd9b898d92 call 7ffd9b891e68 543->546 546->473 549 7ffd9b898d98-7ffd9b898dfb call 7ffd9b891e68 546->549 549->473 552 7ffd9b898e01-7ffd9b898e64 call 7ffd9b891e68 549->552 552->473 555 7ffd9b898e6a-7ffd9b898ecd call 7ffd9b891e68 552->555 555->473 558 7ffd9b898ed3-7ffd9b898f36 call 7ffd9b891e68 555->558 558->473 561 7ffd9b898f3c-7ffd9b898f9f call 7ffd9b891e68 558->561 561->473 564 7ffd9b898fa5-7ffd9b899008 call 7ffd9b891e68 561->564 564->473 567 7ffd9b89900e-7ffd9b899070 call 7ffd9b891e68 564->567 567->473 570 7ffd9b899076-7ffd9b8990d9 call 7ffd9b891e68 567->570 570->473 573 7ffd9b8990df-7ffd9b899142 call 7ffd9b891e68 570->573 573->473 576 7ffd9b899148-7ffd9b8991ab call 7ffd9b891e68 573->576 576->473 579 7ffd9b8991b1-7ffd9b899214 call 7ffd9b891e68 576->579 579->473 582 7ffd9b89921a-7ffd9b89927d call 7ffd9b891e68 579->582 582->473 585 7ffd9b899283-7ffd9b8992e9 call 7ffd9b891e68 582->585 585->473 588 7ffd9b8992ef-7ffd9b899351 call 7ffd9b891e68 585->588 588->473 591 7ffd9b899357-7ffd9b8993ba call 7ffd9b891e68 588->591 591->473 594 7ffd9b8993c0-7ffd9b899423 call 7ffd9b891e68 591->594 594->473 597 7ffd9b899429-7ffd9b89948c call 7ffd9b891e68 594->597 597->473 600 7ffd9b899492-7ffd9b8994f5 call 7ffd9b891e68 597->600 600->473 603 7ffd9b8994fb-7ffd9b89955e call 7ffd9b891e68 600->603 603->473 606 7ffd9b899564-7ffd9b8995c7 call 7ffd9b891e68 603->606 606->473 609 7ffd9b8995cd-7ffd9b89962f call 7ffd9b891e68 606->609 609->473 612 7ffd9b899635-7ffd9b899697 call 7ffd9b891e68 609->612 612->473 615 7ffd9b89969d-7ffd9b899700 call 7ffd9b891e68 612->615 615->473 618 7ffd9b899706-7ffd9b899769 call 7ffd9b891e68 615->618 618->473 621 7ffd9b89976f-7ffd9b8997d1 call 7ffd9b891e68 618->621 621->473 624 7ffd9b8997d7-7ffd9b89983a call 7ffd9b891e68 621->624 624->473 627 7ffd9b899840-7ffd9b8998a6 call 7ffd9b891e68 624->627 627->473 630 7ffd9b8998ac-7ffd9b89990f call 7ffd9b891e68 627->630 630->473 633 7ffd9b899915-7ffd9b89997b call 7ffd9b891e68 630->633 633->473 636 7ffd9b899981-7ffd9b8999e7 call 7ffd9b891e68 633->636 636->473 639 7ffd9b8999ed-7ffd9b899a4f call 7ffd9b891e68 636->639 639->473 642 7ffd9b899a55-7ffd9b899abb call 7ffd9b891e68 639->642 642->473 645 7ffd9b899ac1-7ffd9b899b27 call 7ffd9b891e68 642->645 645->473 648 7ffd9b899b2d-7ffd9b899b8f call 7ffd9b891e68 645->648 648->473 651 7ffd9b899b95-7ffd9b899bf7 call 7ffd9b891e68 648->651 651->473 654 7ffd9b899bfd-7ffd9b899c5f call 7ffd9b891e68 651->654 654->473 657 7ffd9b899c65-7ffd9b899cc8 call 7ffd9b891e68 654->657 657->473 660 7ffd9b899cce-7ffd9b899d31 call 7ffd9b891e68 657->660 660->473 663 7ffd9b899d37-7ffd9b899d99 call 7ffd9b891e68 660->663 663->473 666 7ffd9b899d9f-7ffd9b899e01 call 7ffd9b891e68 663->666 666->473 669 7ffd9b899e07-7ffd9b899e6a call 7ffd9b891e68 666->669 669->473 672 7ffd9b899e70-7ffd9b899ed6 call 7ffd9b891e68 669->672 672->473 675 7ffd9b899edc-7ffd9b899f42 call 7ffd9b891e68 672->675 675->473 678 7ffd9b899f48-7ffd9b899faa call 7ffd9b891e68 675->678 678->473 681 7ffd9b899fb0-7ffd9b89a016 call 7ffd9b891e68 678->681 681->473 684 7ffd9b89a01c-7ffd9b89a082 call 7ffd9b891e68 681->684 684->473 687 7ffd9b89a088-7ffd9b89a0ee call 7ffd9b891e68 684->687 687->473 690 7ffd9b89a0f4-7ffd9b89a15a call 7ffd9b891e68 687->690 690->473 693 7ffd9b89a160-7ffd9b89a1c6 call 7ffd9b891e68 690->693 693->473 696 7ffd9b89a1cc-7ffd9b89a22f call 7ffd9b891e68 693->696 696->473 699 7ffd9b89a235-7ffd9b89a298 call 7ffd9b891e68 696->699 699->473 702 7ffd9b89a29e-7ffd9b89a301 call 7ffd9b891e68 699->702 702->473 705 7ffd9b89a307-7ffd9b89a36a call 7ffd9b891e68 702->705 705->473 708 7ffd9b89a370-7ffd9b89a3d6 call 7ffd9b891e68 705->708 708->473 711 7ffd9b89a3dc-7ffd9b89a442 call 7ffd9b891e68 708->711 711->473 714 7ffd9b89a448-7ffd9b89a4ae call 7ffd9b891e68 711->714 714->473 717 7ffd9b89a4b4-7ffd9b89a51a call 7ffd9b891e68 714->717 717->473 720 7ffd9b89a520-7ffd9b89a586 call 7ffd9b891e68 717->720 720->473 723 7ffd9b89a58c-7ffd9b89a5f2 call 7ffd9b891e68 720->723 723->473 726 7ffd9b89a5f8-7ffd9b89a65b call 7ffd9b891e68 723->726 726->473 729 7ffd9b89a661-7ffd9b89a6c7 call 7ffd9b891e68 726->729 729->473 732 7ffd9b89a6cd-7ffd9b89a730 call 7ffd9b891e68 729->732 732->473 735 7ffd9b89a736-7ffd9b89a79c call 7ffd9b891e68 732->735 735->473 738 7ffd9b89a7a2-7ffd9b89a808 call 7ffd9b891e68 735->738 738->473 741 7ffd9b89a80e-7ffd9b89a874 call 7ffd9b891e68 738->741 741->473 744 7ffd9b89a87a-7ffd9b89a8e0 call 7ffd9b891e68 741->744 744->473 747 7ffd9b89a8e6-7ffd9b89a949 call 7ffd9b891e68 744->747 747->473 750 7ffd9b89a94f-7ffd9b89a9b5 call 7ffd9b891e68 747->750 750->473 753 7ffd9b89a9bb-7ffd9b89aa21 call 7ffd9b891e68 750->753 753->473 756 7ffd9b89aa27-7ffd9b89aa8a call 7ffd9b891e68 753->756 756->473 759 7ffd9b89aa90-7ffd9b89aaf6 call 7ffd9b891e68 756->759 759->473 762 7ffd9b89aafc-7ffd9b89ab62 call 7ffd9b891e68 759->762 762->473 765 7ffd9b89ab68-7ffd9b89abce call 7ffd9b891e68 762->765 765->473 768 7ffd9b89abd4-7ffd9b89ac64 765->768 768->473
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $H
                                      • API String ID: 0-1323546614
                                      • Opcode ID: 9cdc57c7eb77aeed24729ee7eb022fb5ad9e1d786094ec9b004177b83a4b310e
                                      • Instruction ID: 785115c51faa128a73ff572f60aa618222920a6184a71cc8d6d58b6521eac315
                                      • Opcode Fuzzy Hash: 9cdc57c7eb77aeed24729ee7eb022fb5ad9e1d786094ec9b004177b83a4b310e
                                      • Instruction Fuzzy Hash: 7AA32130608A4D4FDB59DB58C450BA5B7A2FF9D304F6486EDD04ED72D2CE36AA82CB44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4W_H$8L_H$VL_H
                                      • API String ID: 0-1210358828
                                      • Opcode ID: b12e7f18ced5e486bc3dabd82400bc7215411c940e05604eecdd7f7844120409
                                      • Instruction ID: bc0279994568f08ccfb14ea81d6b5c96d50f8370787107adbd62119b01f1e358
                                      • Opcode Fuzzy Hash: b12e7f18ced5e486bc3dabd82400bc7215411c940e05604eecdd7f7844120409
                                      • Instruction Fuzzy Hash: 0DC2E530B09A4D8FDBA8DB58C4A5AB877E1FF59301F1504BAD04EC76A2DE34AD42CB51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1333 7ffd9b89ebf8-7ffd9b8a2261 call 7ffd9b8a2120 1340 7ffd9b8a2284-7ffd9b8a2293 1333->1340 1341 7ffd9b8a2295-7ffd9b8a22af call 7ffd9b8a2120 call 7ffd9b8a2170 1340->1341 1342 7ffd9b8a2263-7ffd9b8a2279 call 7ffd9b8a2120 call 7ffd9b8a2170 1340->1342 1351 7ffd9b8a227b-7ffd9b8a2282 1342->1351 1352 7ffd9b8a22b0-7ffd9b8a2300 1342->1352 1351->1340 1356 7ffd9b8a230c-7ffd9b8a2343 1352->1356 1357 7ffd9b8a2302-7ffd9b8a2307 call 7ffd9b8a0d88 1352->1357 1360 7ffd9b8a2349-7ffd9b8a2354 1356->1360 1361 7ffd9b8a253f-7ffd9b8a25a9 1356->1361 1357->1356 1362 7ffd9b8a2356-7ffd9b8a2364 1360->1362 1363 7ffd9b8a23c8-7ffd9b8a23cd 1360->1363 1391 7ffd9b8a25c6-7ffd9b8a25f0 1361->1391 1392 7ffd9b8a25ab-7ffd9b8a25b1 1361->1392 1362->1361 1367 7ffd9b8a236a-7ffd9b8a2379 1362->1367 1364 7ffd9b8a2440-7ffd9b8a244a 1363->1364 1365 7ffd9b8a23cf-7ffd9b8a23db 1363->1365 1368 7ffd9b8a246c-7ffd9b8a2474 1364->1368 1369 7ffd9b8a244c-7ffd9b8a2459 call 7ffd9b8a0da8 1364->1369 1365->1361 1372 7ffd9b8a23e1-7ffd9b8a23f4 1365->1372 1370 7ffd9b8a237b-7ffd9b8a23ab 1367->1370 1371 7ffd9b8a23ad-7ffd9b8a23b8 1367->1371 1376 7ffd9b8a2477-7ffd9b8a2482 1368->1376 1386 7ffd9b8a245e-7ffd9b8a246a 1369->1386 1370->1371 1378 7ffd9b8a23f9-7ffd9b8a23fc 1370->1378 1371->1361 1375 7ffd9b8a23be-7ffd9b8a23c6 1371->1375 1372->1376 1375->1362 1375->1363 1376->1361 1379 7ffd9b8a2488-7ffd9b8a2498 1376->1379 1382 7ffd9b8a23fe-7ffd9b8a240e 1378->1382 1383 7ffd9b8a2412-7ffd9b8a241a 1378->1383 1379->1361 1384 7ffd9b8a249e-7ffd9b8a24ab 1379->1384 1382->1383 1383->1361 1388 7ffd9b8a2420-7ffd9b8a243f 1383->1388 1384->1361 1387 7ffd9b8a24b1-7ffd9b8a24d1 1384->1387 1386->1368 1387->1361 1398 7ffd9b8a24d3-7ffd9b8a24e2 1387->1398 1395 7ffd9b8a25f1-7ffd9b8a2645 1392->1395 1396 7ffd9b8a25b3-7ffd9b8a25c4 1392->1396 1411 7ffd9b8a2647-7ffd9b8a2657 1395->1411 1412 7ffd9b8a2659-7ffd9b8a2691 1395->1412 1396->1391 1396->1392 1399 7ffd9b8a252d-7ffd9b8a253e 1398->1399 1400 7ffd9b8a24e4-7ffd9b8a24ef 1398->1400 1400->1399 1405 7ffd9b8a24f1-7ffd9b8a2528 call 7ffd9b8a0da8 1400->1405 1405->1399 1411->1411 1411->1412 1417 7ffd9b8a26e8-7ffd9b8a26ef 1412->1417 1418 7ffd9b8a2693-7ffd9b8a2699 1412->1418 1420 7ffd9b8a2732-7ffd9b8a275b 1417->1420 1421 7ffd9b8a26f1-7ffd9b8a26f2 1417->1421 1418->1417 1419 7ffd9b8a269b-7ffd9b8a269c 1418->1419 1422 7ffd9b8a269f-7ffd9b8a26a2 1419->1422 1423 7ffd9b8a26f5-7ffd9b8a26f8 1421->1423 1425 7ffd9b8a26a8-7ffd9b8a26b5 1422->1425 1426 7ffd9b8a275c-7ffd9b8a2771 1422->1426 1423->1426 1427 7ffd9b8a26fa-7ffd9b8a270b 1423->1427 1428 7ffd9b8a26b7-7ffd9b8a26de 1425->1428 1429 7ffd9b8a26e1-7ffd9b8a26e6 1425->1429 1436 7ffd9b8a277b-7ffd9b8a2801 1426->1436 1437 7ffd9b8a2773-7ffd9b8a277a 1426->1437 1430 7ffd9b8a2729-7ffd9b8a2730 1427->1430 1431 7ffd9b8a270d-7ffd9b8a2713 1427->1431 1428->1429 1429->1417 1429->1422 1430->1420 1430->1423 1431->1426 1432 7ffd9b8a2715-7ffd9b8a2725 1431->1432 1432->1430 1437->1436
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: d
                                      • API String ID: 0-2564639436
                                      • Opcode ID: 00daa9ebf01b59cb4229e79cd88ef454151984ef39100cc6d57909dccbab9bb0
                                      • Instruction ID: f0037e02464aad7713f3fe9990b6cd8f62eeb5bb5fd69d427aef27aa149bfdc3
                                      • Opcode Fuzzy Hash: 00daa9ebf01b59cb4229e79cd88ef454151984ef39100cc6d57909dccbab9bb0
                                      • Instruction Fuzzy Hash: 03225431A1EA494FE769DFA898A157173D0FF49310B0502BAD45EC71ABEE28F842C791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1445 7ffd9b8a1d88-7ffd9b8a1dee 1449 7ffd9b8a2066-7ffd9b8a2099 1445->1449 1450 7ffd9b8a1df4-7ffd9b8a1e80 call 7ffd9b8a0cb8 1445->1450 1457 7ffd9b8a209b-7ffd9b8a20a2 1449->1457 1458 7ffd9b8a20a3-7ffd9b8a20ad 1449->1458 1481 7ffd9b8a1ee2-7ffd9b8a1ef5 1450->1481 1457->1458 1460 7ffd9b8a20ae 1458->1460 1461 7ffd9b8a20af-7ffd9b8a20be 1458->1461 1460->1461 1463 7ffd9b8a20c0-7ffd9b8a20c2 1461->1463 1464 7ffd9b8a20f2-7ffd9b8a2121 1461->1464 1465 7ffd9b8a20cc-7ffd9b8a20d2 1463->1465 1466 7ffd9b8a20c4-7ffd9b8a20c7 call 7ffd9b8a0d88 1463->1466 1478 7ffd9b8a2124-7ffd9b8a215a 1464->1478 1469 7ffd9b8a20e1-7ffd9b8a20f1 1465->1469 1470 7ffd9b8a20d4-7ffd9b8a20df 1465->1470 1466->1465 1470->1469 1478->1478 1479 7ffd9b8a215c 1478->1479 1482 7ffd9b8a1ef7-7ffd9b8a1ef9 1481->1482 1483 7ffd9b8a1e82-7ffd9b8a1eae call 7ffd9b8a0f28 * 2 call 7ffd9b8a0f30 1481->1483 1484 7ffd9b8a1f52-7ffd9b8a1f65 1482->1484 1507 7ffd9b8a1eb6-7ffd9b8a1ee0 1483->1507 1508 7ffd9b8a1eb0-7ffd9b8a1eb5 1483->1508 1486 7ffd9b8a1f67-7ffd9b8a1f69 1484->1486 1487 7ffd9b8a1efb-7ffd9b8a1f50 call 7ffd9b8a0f28 * 2 call 7ffd9b8902c8 1484->1487 1489 7ffd9b8a200e-7ffd9b8a2021 1486->1489 1487->1484 1494 7ffd9b8a2027-7ffd9b8a2065 1489->1494 1495 7ffd9b8a1f6e-7ffd9b8a1fa0 call 7ffd9b8a0f28 1489->1495 1503 7ffd9b8a1fba-7ffd9b8a1fbb 1495->1503 1504 7ffd9b8a1fa2-7ffd9b8a1fb8 1495->1504 1510 7ffd9b8a1fbd-7ffd9b8a2007 call 7ffd9b89ebf8 call 7ffd9b8a0d90 1503->1510 1504->1510 1507->1481 1508->1507 1519 7ffd9b8a200c 1510->1519 1519->1489
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fish
                                      • API String ID: 0-1064584243
                                      • Opcode ID: 2b5a27ff043538f16afec060b408674d0e2a707d9980d7f7e9ecee14a025e81f
                                      • Instruction ID: 56ded4e37d08f3e8b248051859b14f068d3b079e48402e0bd57de4d0807b4409
                                      • Opcode Fuzzy Hash: 2b5a27ff043538f16afec060b408674d0e2a707d9980d7f7e9ecee14a025e81f
                                      • Instruction Fuzzy Hash: 83D15B31B1DB4E0FE76DAB68986547577E1EF9A310B0542BEE48BC31E3ED24AD028341
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1741 7ffd9b8ac3ad-7ffd9b8ac40e 1746 7ffd9b8ac47f-7ffd9b8ac495 call 7ffd9b8a88f0 1741->1746 1747 7ffd9b8ac410-7ffd9b8ac415 1741->1747 1749 7ffd9b8ac496-7ffd9b8ac4aa 1746->1749 1757 7ffd9b8ac4af-7ffd9b8ac4ba 1746->1757 1748 7ffd9b8ac417-7ffd9b8ac431 call 7ffd9b8a4f90 1747->1748 1747->1749 1753 7ffd9b8ac548-7ffd9b8ac54a 1749->1753 1755 7ffd9b8ac5bb-7ffd9b8ac5c0 1753->1755 1756 7ffd9b8ac54c-7ffd9b8ac551 1753->1756 1759 7ffd9b8ac5d2 1755->1759 1758 7ffd9b8ac553-7ffd9b8ac56f 1756->1758 1756->1759 1760 7ffd9b8ac4bc-7ffd9b8ac4cf 1757->1760 1761 7ffd9b8ac4d1-7ffd9b8ac4dc 1757->1761 1762 7ffd9b8ac5d8-7ffd9b8ac626 call 7ffd9b8a88f0 * 2 call 7ffd9b8a4bf0 1759->1762 1763 7ffd9b8ac5d4-7ffd9b8ac5d5 1759->1763 1760->1753 1764 7ffd9b8ac4de-7ffd9b8ac4f0 1761->1764 1765 7ffd9b8ac4f2-7ffd9b8ac511 1761->1765 1778 7ffd9b8ac62c-7ffd9b8ac64a 1762->1778 1779 7ffd9b8ac7a9-7ffd9b8ac803 1762->1779 1763->1762 1764->1753 1765->1753 1769 7ffd9b8ac513-7ffd9b8ac544 1765->1769 1769->1753 1778->1779 1780 7ffd9b8ac650-7ffd9b8ac66a 1778->1780 1791 7ffd9b8ac936-7ffd9b8ac993 1779->1791 1792 7ffd9b8ac809-7ffd9b8ac864 call 7ffd9b8a88f0 * 2 call 7ffd9b8a4bf0 1779->1792 1781 7ffd9b8ac66c-7ffd9b8ac66f 1780->1781 1782 7ffd9b8ac6c3-7ffd9b8ac6e8 1780->1782 1784 7ffd9b8ac6f0-7ffd9b8ac6fa 1781->1784 1785 7ffd9b8ac671-7ffd9b8ac690 1781->1785 1787 7ffd9b8ac6ea-7ffd9b8ac6ef 1782->1787 1788 7ffd9b8ac701-7ffd9b8ac716 1782->1788 1793 7ffd9b8ac6fc-7ffd9b8ac6ff 1784->1793 1794 7ffd9b8ac72e-7ffd9b8ac77f call 7ffd9b8a92c0 1784->1794 1785->1788 1790 7ffd9b8ac692-7ffd9b8ac697 1785->1790 1787->1784 1789 7ffd9b8ac718-7ffd9b8ac729 1788->1789 1789->1794 1795 7ffd9b8ac72b-7ffd9b8ac72c 1789->1795 1790->1789 1797 7ffd9b8ac699-7ffd9b8ac6c2 call 7ffd9b8a4f90 1790->1797 1807 7ffd9b8ac999-7ffd9b8ac9ee call 7ffd9b8a88f0 * 2 call 7ffd9b8a4bf0 1791->1807 1808 7ffd9b8aca4e-7ffd9b8aca59 1791->1808 1792->1791 1815 7ffd9b8ac86a-7ffd9b8ac8c0 1792->1815 1793->1794 1794->1779 1803 7ffd9b8ac781-7ffd9b8ac7a8 1794->1803 1795->1794 1797->1782 1807->1808 1832 7ffd9b8ac9f0-7ffd9b8aca14 1807->1832 1816 7ffd9b8aca5b-7ffd9b8aca5d 1808->1816 1817 7ffd9b8aca5e-7ffd9b8aca7a 1808->1817 1815->1791 1819 7ffd9b8ac8c2-7ffd9b8ac90d call 7ffd9b8a92c0 1815->1819 1816->1817 1824 7ffd9b8aca7c-7ffd9b8acaa7 1817->1824 1825 7ffd9b8acac4-7ffd9b8acb06 call 7ffd9b8a88f0 * 2 call 7ffd9b8a4bf0 1817->1825 1819->1791 1833 7ffd9b8ac90f-7ffd9b8ac935 1819->1833 1828 7ffd9b8acc3b-7ffd9b8acc6a 1824->1828 1829 7ffd9b8acaad-7ffd9b8acac3 1824->1829 1825->1828 1847 7ffd9b8acb0c-7ffd9b8acb2a 1825->1847 1844 7ffd9b8acc6c-7ffd9b8acc97 1828->1844 1845 7ffd9b8accb4-7ffd9b8accf3 call 7ffd9b8a88f0 * 2 call 7ffd9b8a4bf0 1828->1845 1829->1825 1835 7ffd9b8aca16-7ffd9b8aca26 1832->1835 1836 7ffd9b8aca42-7ffd9b8aca4d 1832->1836 1835->1808 1839 7ffd9b8aca28-7ffd9b8aca3f 1835->1839 1839->1836 1848 7ffd9b8acdf7-7ffd9b8ace29 1844->1848 1849 7ffd9b8acc9d-7ffd9b8accb3 1844->1849 1845->1848 1876 7ffd9b8accf9-7ffd9b8acd14 1845->1876 1847->1828 1851 7ffd9b8acb30-7ffd9b8acb4a 1847->1851 1865 7ffd9b8ace2b-7ffd9b8ace56 1848->1865 1866 7ffd9b8ace73-7ffd9b8ace8b call 7ffd9b8a88f0 1848->1866 1849->1845 1853 7ffd9b8acb4c-7ffd9b8acb4f 1851->1853 1854 7ffd9b8acba3-7ffd9b8acba7 1851->1854 1857 7ffd9b8acbd0-7ffd9b8acc0f call 7ffd9b8a92c0 1853->1857 1858 7ffd9b8acb51-7ffd9b8acb6a 1853->1858 1860 7ffd9b8acc28-7ffd9b8acc3a 1854->1860 1861 7ffd9b8acba9-7ffd9b8acbcf call 7ffd9b8a4f90 1854->1861 1877 7ffd9b8acc11 1857->1877 1863 7ffd9b8acb6c-7ffd9b8acb81 1858->1863 1864 7ffd9b8acb83-7ffd9b8acb94 1858->1864 1861->1857 1871 7ffd9b8acb98-7ffd9b8acba0 1863->1871 1864->1871 1872 7ffd9b8acf25-7ffd9b8acf37 1865->1872 1873 7ffd9b8ace5c-7ffd9b8ace6f 1865->1873 1866->1872 1871->1877 1878 7ffd9b8acba2 1871->1878 1886 7ffd9b8acf79-7ffd9b8acf87 1872->1886 1887 7ffd9b8acf39-7ffd9b8acf5a 1872->1887 1873->1866 1883 7ffd9b8acd16-7ffd9b8acd19 1876->1883 1884 7ffd9b8acd6d-7ffd9b8acd74 1876->1884 1877->1828 1882 7ffd9b8acc13-7ffd9b8acc26 1877->1882 1878->1854 1882->1860 1888 7ffd9b8acd1b-7ffd9b8acd39 1883->1888 1889 7ffd9b8acd9a-7ffd9b8acda9 1883->1889 1884->1848 1890 7ffd9b8acd7a-7ffd9b8acd97 1884->1890 1893 7ffd9b8acf8d-7ffd9b8acfa1 1886->1893 1894 7ffd9b8ad0e3-7ffd9b8ad0f9 1886->1894 1897 7ffd9b8acf5c-7ffd9b8acf76 1887->1897 1898 7ffd9b8acfa4-7ffd9b8acfdf call 7ffd9b8a88f0 * 2 call 7ffd9b8aa570 1887->1898 1891 7ffd9b8acdaa-7ffd9b8acdbe call 7ffd9b8a92c0 1888->1891 1895 7ffd9b8acd3b-7ffd9b8acd40 1888->1895 1889->1891 1890->1889 1899 7ffd9b8acdc1-7ffd9b8acdcd 1891->1899 1893->1898 1908 7ffd9b8ad0fb-7ffd9b8ad10f 1894->1908 1909 7ffd9b8ad0fa 1894->1909 1895->1899 1900 7ffd9b8acd42-7ffd9b8acd66 call 7ffd9b8a4f90 1895->1900 1897->1886 1920 7ffd9b8acff9-7ffd9b8ad004 1898->1920 1921 7ffd9b8acfe1-7ffd9b8acff7 1898->1921 1899->1848 1902 7ffd9b8acdcf-7ffd9b8acdf6 1899->1902 1900->1884 1912 7ffd9b8ad111-7ffd9b8ad149 1908->1912 1909->1908 1914 7ffd9b8ad14b-7ffd9b8ad15d call 7ffd9b890248 1912->1914 1915 7ffd9b8ad15f 1912->1915 1917 7ffd9b8ad164-7ffd9b8ad166 1914->1917 1915->1917 1923 7ffd9b8ad168-7ffd9b8ad173 1917->1923 1924 7ffd9b8ad17a-7ffd9b8ad1f1 1917->1924 1929 7ffd9b8ad016 1920->1929 1930 7ffd9b8ad006-7ffd9b8ad014 1920->1930 1921->1920 1923->1924 1948 7ffd9b8ad1f7-7ffd9b8ad26f 1924->1948 1949 7ffd9b8ad2d8-7ffd9b8ad2df 1924->1949 1931 7ffd9b8ad018-7ffd9b8ad01d 1929->1931 1930->1931 1933 7ffd9b8ad01f-7ffd9b8ad03e call 7ffd9b8a0c00 1931->1933 1934 7ffd9b8ad040-7ffd9b8ad056 1931->1934 1940 7ffd9b8ad083-7ffd9b8ad089 1933->1940 1941 7ffd9b8ad058-7ffd9b8ad063 1934->1941 1942 7ffd9b8ad06a-7ffd9b8ad07f call 7ffd9b8aaf60 1934->1942 1940->1909 1944 7ffd9b8ad08b-7ffd9b8ad090 1940->1944 1941->1942 1942->1940 1944->1912 1947 7ffd9b8ad092-7ffd9b8ad0c0 call 7ffd9b8a4f90 call 7ffd9b8a4bf0 1944->1947 1947->1894 1961 7ffd9b8ad0c2-7ffd9b8ad0e2 1947->1961 1966 7ffd9b8ad2cf-7ffd9b8ad2d7 call 7ffd9b8ad324 1948->1966 1967 7ffd9b8ad271-7ffd9b8ad277 call 7ffd9b8a66e8 1948->1967 1952 7ffd9b8ad2fc-7ffd9b8ad30c 1949->1952 1953 7ffd9b8ad2e1-7ffd9b8ad2ee 1949->1953 1957 7ffd9b8ad312-7ffd9b8ad323 1952->1957 1953->1952 1960 7ffd9b8ad2f0-7ffd9b8ad2fa 1953->1960 1960->1952 1966->1949 1971 7ffd9b8ad27c-7ffd9b8ad2ce 1967->1971 1971->1966
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ab33f81b5c6dbc547ecac6ccfa24f2ea99780965573ed536f6a7073fdcd87ece
                                      • Instruction ID: 3109cb8fc6e4021b51c2e2700284794f38ddd1226c5d26d2c7860f0af0607f0a
                                      • Opcode Fuzzy Hash: ab33f81b5c6dbc547ecac6ccfa24f2ea99780965573ed536f6a7073fdcd87ece
                                      • Instruction Fuzzy Hash: 26B28C30A0DB494FD359DB28C8A44B5B7E1FFC9301B1445BEE48AC72A6DE34E946CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e45cb00de5e3ab614e1513f0ddeb58d472e939374cfcffc7ff09f2663174d62e
                                      • Instruction ID: 047e2dc1303d953049f87323111741ea7fe7936f656da7f0ac27d96fcac5ea38
                                      • Opcode Fuzzy Hash: e45cb00de5e3ab614e1513f0ddeb58d472e939374cfcffc7ff09f2663174d62e
                                      • Instruction Fuzzy Hash: 92521530B09A0D8FDB68DB68D465A7977E1EF58301F1501BEE08EC76A2DE34AD428791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30e52b2160331a2a67244b73e9542b671a644bb354b2270b02a02c0f0ea4c14a
                                      • Instruction ID: 91e040f498a8203e5e2fbe927597cdfa5aa0dd827182eb6a039a0f6db73429ed
                                      • Opcode Fuzzy Hash: 30e52b2160331a2a67244b73e9542b671a644bb354b2270b02a02c0f0ea4c14a
                                      • Instruction Fuzzy Hash: 68422830B1DA4A4FEB2DAB68D8616B977D1FF49300F1501BED49E835E7DD28B8428781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8676575b49b941c6518d18b7ff7d2e20d99dceffb67c4c9e51df34d2641fdaa
                                      • Instruction ID: 240bb27b6437a1ab24a2d780d96d71f9cfe1821254388d11111b2e16f67a722c
                                      • Opcode Fuzzy Hash: e8676575b49b941c6518d18b7ff7d2e20d99dceffb67c4c9e51df34d2641fdaa
                                      • Instruction Fuzzy Hash: 2842E331B19A0A4FEB69EBA8C4605797BD1FF4D310B16457DD08EC72E2DE28BA42C740
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1a3f8a2aa99edbb2e12fc643f3de020713bc1c688ee7aaf32f35b65da5a40e97
                                      • Instruction ID: be3a10004d424f6238db63ad40e044e85c80ce19bbc2a6384774e7241bac9f47
                                      • Opcode Fuzzy Hash: 1a3f8a2aa99edbb2e12fc643f3de020713bc1c688ee7aaf32f35b65da5a40e97
                                      • Instruction Fuzzy Hash: A5C1BD31A1EB894FE72DCB2884A5171B7D1FF99301B144ABED4CAC71B1DE28A542C791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1100 7ffd9b89fcb0-7ffd9b89fd1d 1106 7ffd9b89fd30-7ffd9b89fddc 1100->1106 1107 7ffd9b89fd1f-7ffd9b89fd2f 1100->1107 1114 7ffd9b89fdde-7ffd9b89fe05 1106->1114 1115 7ffd9b89fe4f-7ffd9b89fe72 1106->1115 1114->1115 1119 7ffd9b89fe07-7ffd9b89fe0a 1114->1119 1118 7ffd9b89fe74-7ffd9b89feb2 LoadLibraryA 1115->1118 1120 7ffd9b89feba-7ffd9b89fee6 call 7ffd9b89ff0a 1118->1120 1121 7ffd9b89feb4 1118->1121 1122 7ffd9b89fe0c-7ffd9b89fe1f 1119->1122 1123 7ffd9b89fe44-7ffd9b89fe4c 1119->1123 1120->1118 1129 7ffd9b89fee8-7ffd9b89feee 1120->1129 1121->1120 1125 7ffd9b89fe21 1122->1125 1126 7ffd9b89fe23-7ffd9b89fe36 1122->1126 1123->1115 1125->1126 1126->1126 1127 7ffd9b89fe38-7ffd9b89fe40 1126->1127 1127->1123 1130 7ffd9b89fef5-7ffd9b89ff09 1129->1130 1131 7ffd9b89fef0 1129->1131 1131->1130
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: $
                                      • API String ID: 1029625771-3993045852
                                      • Opcode ID: c3d2654ca86c3150988314d1b9890cb14d2e9499c1e0256ed6e644690b7b506c
                                      • Instruction ID: a240ce4369ffe833c368e2368f43f664decc902c92cd5a9748aed91ca0503e32
                                      • Opcode Fuzzy Hash: c3d2654ca86c3150988314d1b9890cb14d2e9499c1e0256ed6e644690b7b506c
                                      • Instruction Fuzzy Hash: 5F81E630608A8D4FEB6CDF68D8557F93BE1FF59310F14426EE80DC72A2DA75A9418781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1170 7ffd9b98026b-7ffd9b98026d 1171 7ffd9b9803b1-7ffd9b9803b7 1170->1171 1172 7ffd9b98026e-7ffd9b98027c 1170->1172 1175 7ffd9b9803b9-7ffd9b9803c8 1171->1175 1174 7ffd9b980284-7ffd9b980286 1172->1174 1176 7ffd9b980288-7ffd9b980289 1174->1176 1177 7ffd9b9802f7-7ffd9b980306 1174->1177 1179 7ffd9b9803c9-7ffd9b980427 1175->1179 1180 7ffd9b98024f-7ffd9b98026a 1176->1180 1181 7ffd9b98028b 1176->1181 1178 7ffd9b980307-7ffd9b980309 1177->1178 1178->1171 1183 7ffd9b98030a-7ffd9b980348 1178->1183 1194 7ffd9b98045c-7ffd9b980474 1179->1194 1195 7ffd9b980429-7ffd9b980440 1179->1195 1180->1170 1181->1178 1185 7ffd9b98028d 1181->1185 1183->1175 1208 7ffd9b98034a-7ffd9b98034d 1183->1208 1187 7ffd9b9802d4 1185->1187 1188 7ffd9b98028f-7ffd9b9802a0 1185->1188 1187->1171 1189 7ffd9b9802da-7ffd9b9802f5 1187->1189 1196 7ffd9b980233-7ffd9b98024e 1188->1196 1197 7ffd9b9802a2-7ffd9b9802b8 1188->1197 1189->1177 1198 7ffd9b980442-7ffd9b98045a 1195->1198 1199 7ffd9b9804b1-7ffd9b9804d0 1195->1199 1196->1180 1197->1171 1202 7ffd9b9802be-7ffd9b9802d1 1197->1202 1198->1194 1203 7ffd9b9804d1-7ffd9b9804e7 1198->1203 1199->1203 1202->1187 1211 7ffd9b98051c-7ffd9b980534 1203->1211 1212 7ffd9b9804e9-7ffd9b980500 1203->1212 1208->1179 1210 7ffd9b98034f 1208->1210 1213 7ffd9b980351-7ffd9b98035f 1210->1213 1214 7ffd9b980396-7ffd9b9803b0 1210->1214 1216 7ffd9b980502-7ffd9b98051a 1212->1216 1217 7ffd9b980571-7ffd9b980590 1212->1217 1213->1214 1216->1211 1221 7ffd9b980592-7ffd9b980595 1217->1221 1222 7ffd9b980597-7ffd9b9805a7 1217->1222 1221->1222 1225 7ffd9b9805dc-7ffd9b9805f4 1222->1225 1226 7ffd9b9805a9-7ffd9b9805c0 1222->1226 1228 7ffd9b9805c2-7ffd9b9805da 1226->1228 1229 7ffd9b980631-7ffd9b980668 1226->1229 1228->1225 1234 7ffd9b98069d-7ffd9b9806a8 1229->1234 1235 7ffd9b98066a-7ffd9b98067a 1229->1235 1242 7ffd9b9806bc-7ffd9b9806c5 1234->1242 1243 7ffd9b9806aa-7ffd9b9806b9 1234->1243 1236 7ffd9b98067c-7ffd9b98067e 1235->1236 1237 7ffd9b9806eb-7ffd9b9806f9 1235->1237 1240 7ffd9b980680 1236->1240 1241 7ffd9b9806fa-7ffd9b98073c 1236->1241 1237->1241 1244 7ffd9b9806c6-7ffd9b9806c7 1240->1244 1246 7ffd9b980682-7ffd9b98069c 1240->1246 1250 7ffd9b98073e 1241->1250 1251 7ffd9b980786-7ffd9b98078b 1241->1251 1242->1244 1243->1242 1246->1234 1252 7ffd9b980742-7ffd9b980772 1250->1252 1253 7ffd9b980a42-7ffd9b980a56 1251->1253 1254 7ffd9b98078c-7ffd9b98079e 1251->1254 1252->1253 1255 7ffd9b980778-7ffd9b980781 1252->1255 1262 7ffd9b980a57-7ffd9b980ab7 1253->1262 1256 7ffd9b98079f-7ffd9b9807a3 1254->1256 1258 7ffd9b980783-7ffd9b980785 1255->1258 1259 7ffd9b9807a6-7ffd9b9807bd 1256->1259 1260 7ffd9b9807a5 1256->1260 1258->1251 1259->1253 1263 7ffd9b9807c3-7ffd9b9807d6 1259->1263 1260->1252 1260->1259 1265 7ffd9b980aec-7ffd9b980b04 1262->1265 1266 7ffd9b980ab9-7ffd9b980ad0 1262->1266 1271 7ffd9b9807d8-7ffd9b9807d9 1263->1271 1272 7ffd9b980847-7ffd9b980856 1263->1272 1269 7ffd9b980b41-7ffd9b980b77 1265->1269 1268 7ffd9b980ad2-7ffd9b980aeb 1266->1268 1266->1269 1268->1265 1276 7ffd9b980bac-7ffd9b980bc4 1269->1276 1277 7ffd9b980b79-7ffd9b980b90 1269->1277 1271->1256 1275 7ffd9b9807db 1271->1275 1279 7ffd9b980857-7ffd9b980859 1272->1279 1275->1279 1281 7ffd9b9807dd 1275->1281 1282 7ffd9b980b92-7ffd9b980bab 1277->1282 1283 7ffd9b980c01-7ffd9b980c50 1277->1283 1279->1253 1280 7ffd9b98085a-7ffd9b980872 1279->1280 1294 7ffd9b980874-7ffd9b980877 1280->1294 1295 7ffd9b9808e3-7ffd9b9808f0 1280->1295 1286 7ffd9b980824 1281->1286 1287 7ffd9b9807df-7ffd9b9807f0 1281->1287 1282->1276 1299 7ffd9b980c52-7ffd9b980c84 1283->1299 1300 7ffd9b980cc1-7ffd9b980cfe 1283->1300 1286->1253 1292 7ffd9b98082a-7ffd9b980845 1286->1292 1287->1258 1296 7ffd9b9807f2-7ffd9b980808 1287->1296 1292->1272 1301 7ffd9b9808f3 1294->1301 1302 7ffd9b980879 1294->1302 1295->1301 1296->1253 1303 7ffd9b98080e-7ffd9b980821 1296->1303 1301->1253 1309 7ffd9b9808f9-7ffd9b98090c 1301->1309 1306 7ffd9b9808c0 1302->1306 1307 7ffd9b98087b-7ffd9b9808a2 1302->1307 1303->1286 1312 7ffd9b9808c3-7ffd9b9808e1 1306->1312 1313 7ffd9b9808c2 1306->1313 1307->1253 1317 7ffd9b9808a8-7ffd9b9808be 1307->1317 1319 7ffd9b98090e-7ffd9b980912 1309->1319 1320 7ffd9b98097d-7ffd9b980990 1309->1320 1312->1295 1313->1312 1317->1253 1317->1306 1322 7ffd9b980914 1319->1322 1323 7ffd9b980993 1319->1323 1320->1323 1324 7ffd9b980974-7ffd9b98097b 1322->1324 1323->1253 1325 7ffd9b980999-7ffd9b9809b5 1323->1325 1324->1320 1328 7ffd9b9809d2-7ffd9b9809e6 1325->1328 1329 7ffd9b9809b7-7ffd9b9809cc 1325->1329 1328->1262 1330 7ffd9b9809e8-7ffd9b9809ed 1328->1330 1329->1328 1330->1324 1332 7ffd9b9809ef 1330->1332 1332->1253
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1820292062.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b980000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: A
                                      • API String ID: 0-3554254475
                                      • Opcode ID: c179fa662fc00fbb733cd04ef6b7027041db6bff11434d2646276257a78f9856
                                      • Instruction ID: 22b8ac7c7fe7994ea84a8f8e7e62e93951d376e390fcbee99189835afffc76e3
                                      • Opcode Fuzzy Hash: c179fa662fc00fbb733cd04ef6b7027041db6bff11434d2646276257a78f9856
                                      • Instruction Fuzzy Hash: D3624972A1FF894FE766CB6888655A87BE0FF55700F0A05FED089CB0A3D9346946C781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1727 7ffd9b8a02b4-7ffd9b8a02bb 1728 7ffd9b8a02c6-7ffd9b8a037f VirtualProtect 1727->1728 1729 7ffd9b8a02bd-7ffd9b8a02c5 1727->1729 1733 7ffd9b8a0387-7ffd9b8a03af 1728->1733 1734 7ffd9b8a0381 1728->1734 1729->1728 1734->1733
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: a656f2cd21160c19513d59160a3abf14af78af14f293829e972430eea7ff0c6c
                                      • Instruction ID: 44b0c472bff8ba9ff94607fac8cb663589ee637e9acfc9fdf69e429e43dcc0dc
                                      • Opcode Fuzzy Hash: a656f2cd21160c19513d59160a3abf14af78af14f293829e972430eea7ff0c6c
                                      • Instruction Fuzzy Hash: 6B31E730A0CB4C8FDB18DB9C98466F97BE1EB55721F04426FD049C3292CF64A856C795
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1735 7ffd9b8908bd-7ffd9b89094c FreeConsole 1739 7ffd9b89094e 1735->1739 1740 7ffd9b890954-7ffd9b890970 1735->1740 1739->1740
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID: ConsoleFree
                                      • String ID:
                                      • API String ID: 771614528-0
                                      • Opcode ID: 8e832f2335115d6f4c99081bda0847281d438b3564892d2c0d825395eb5740c2
                                      • Instruction ID: bf6dd42c34f92314de470996e6ccbe33a26f2ca612e8a9a2228b14dd398bd71c
                                      • Opcode Fuzzy Hash: 8e832f2335115d6f4c99081bda0847281d438b3564892d2c0d825395eb5740c2
                                      • Instruction Fuzzy Hash: CA21C47090CB4C8FDB29DB98D849BE9BBF0EF56320F00416FD08AC3152DA746445CB51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1820292062.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b980000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7785bc41dc52140cd374be4024fa5aff0824c7eb1fd56cf2b9d2224e2ee5fd0a
                                      • Instruction ID: f18a06fd14d5fb7b807f6f42fbac1ee59bd31e2a98e429ce5cbb9a5caa2cc11c
                                      • Opcode Fuzzy Hash: 7785bc41dc52140cd374be4024fa5aff0824c7eb1fd56cf2b9d2224e2ee5fd0a
                                      • Instruction Fuzzy Hash: 17424C32A1EBD94FE766DB7888655A47FE0EF56304F0A01FFD489CB0A3D9286906C341
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1820292062.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b980000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d96194bf32e23b755a630ff0110478f23fa794c879b11ec3008acb5d5a116d43
                                      • Instruction ID: 2e1bd80420cb4382b37a9e5d80efe68d6fdacfa7e35bfb172077dcf1cc162145
                                      • Opcode Fuzzy Hash: d96194bf32e23b755a630ff0110478f23fa794c879b11ec3008acb5d5a116d43
                                      • Instruction Fuzzy Hash: 99412531A0DA8D4FDB56DB64C8A44E47FF0FF5A304B0601BBD04ACB5A2DA38B945C780
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1820292062.00007FFD9B980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b980000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7942119acd962995aa602ff4a1e9dff5f73dec1237880ec90e0b969c8fcfec29
                                      • Instruction ID: 1a28d1dd61cf8ebc29e491d05c49413294b947b59129103402c8fafbbc462bd0
                                      • Opcode Fuzzy Hash: 7942119acd962995aa602ff4a1e9dff5f73dec1237880ec90e0b969c8fcfec29
                                      • Instruction Fuzzy Hash: 0DE0E535B056298ADF64EB48D891BE9B3B1EF88300F0041E6D55EA3291CA346A848F52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad1fcc7216d13920e3dfa703d2c3a474df2f8cb6fe5b4f967686e26793dbb406
                                      • Instruction ID: a463101b385d11a49356555ae0fea97a81d30e2ff3a1b3fbe1369edd42376d61
                                      • Opcode Fuzzy Hash: ad1fcc7216d13920e3dfa703d2c3a474df2f8cb6fe5b4f967686e26793dbb406
                                      • Instruction Fuzzy Hash: 20222A30B1DA4A4FEB299B6888615747BE0FF56314F5542BEC08BC71E7DA28F8438785
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1819756313.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd9b890000_M_F+niestandardowy stempel.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 18ac3023f760c4349b5572acc927f14ba4e807e7b2503e6af4cb79f19f18f8a7
                                      • Instruction ID: 6e777619a118ff5f0fc108d20e5923da3918ccd6cd5b969863019a6c785180c8
                                      • Opcode Fuzzy Hash: 18ac3023f760c4349b5572acc927f14ba4e807e7b2503e6af4cb79f19f18f8a7
                                      • Instruction Fuzzy Hash: A602F33171DA494FEB6DEFA888646717BE1EF99300F1500B9D44EC76E6DE25F8428780
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:10.7%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:147
                                      Total number of Limit Nodes:15
                                      execution_graph 38891 6903050 DuplicateHandle 38892 69030e6 38891->38892 38956 6902e08 38957 6902e4e GetCurrentProcess 38956->38957 38959 6902ea0 GetCurrentThread 38957->38959 38960 6902e99 38957->38960 38961 6902ed6 38959->38961 38962 6902edd GetCurrentProcess 38959->38962 38960->38959 38961->38962 38963 6902f13 38962->38963 38964 6902f3b GetCurrentThreadId 38963->38964 38965 6902f6c 38964->38965 38966 2f30848 38968 2f3084e 38966->38968 38967 2f3091b 38968->38967 38972 6901cf0 38968->38972 38976 6901d00 38968->38976 38980 2f3137f 38968->38980 38973 6901d0f 38972->38973 38984 69014a4 38973->38984 38977 6901d0f 38976->38977 38978 69014a4 3 API calls 38977->38978 38979 6901d30 38978->38979 38979->38968 38982 2f31383 38980->38982 38981 2f31480 38981->38968 38982->38981 39060 2f37ea0 38982->39060 38985 69014af 38984->38985 38988 6902c04 38985->38988 38987 69036b6 38987->38987 38989 6902c0f 38988->38989 38990 6903ddc 38989->38990 38992 6905a60 38989->38992 38990->38987 38993 6905a81 38992->38993 38994 6905aa5 38993->38994 38996 6905c10 38993->38996 38994->38990 38998 6905c1d 38996->38998 38997 6905c56 38997->38994 38998->38997 39000 690492c 38998->39000 39001 6904937 39000->39001 39002 6905cc8 39001->39002 39004 6904960 39001->39004 39005 690496b 39004->39005 39011 6904970 39005->39011 39007 6905d37 39015 690b060 39007->39015 39024 690b048 39007->39024 39008 6905d71 39008->39002 39014 690497b 39011->39014 39012 6906ed8 39012->39007 39013 6905a60 3 API calls 39013->39012 39014->39012 39014->39013 39017 690b091 39015->39017 39019 690b191 39015->39019 39016 690b09d 39016->39008 39017->39016 39032 690b2d8 39017->39032 39035 690b2c8 39017->39035 39018 690b0dd 39039 690c5d8 39018->39039 39043 690c5c9 39018->39043 39019->39008 39025 690b060 39024->39025 39027 690b09d 39025->39027 39030 690b2d8 2 API calls 39025->39030 39031 690b2c8 2 API calls 39025->39031 39026 690b0dd 39028 690c5d8 CreateWindowExW 39026->39028 39029 690c5c9 CreateWindowExW 39026->39029 39027->39008 39028->39027 39029->39027 39030->39026 39031->39026 39047 690b318 39032->39047 39033 690b2e2 39033->39018 39036 690b2d8 39035->39036 39038 690b318 2 API calls 39036->39038 39037 690b2e2 39037->39018 39038->39037 39040 690c603 39039->39040 39041 690c6b2 39040->39041 39055 690d4b0 39040->39055 39041->39041 39044 690c5d8 39043->39044 39045 690c6b2 39044->39045 39046 690d4b0 CreateWindowExW 39044->39046 39046->39045 39048 690b31d 39047->39048 39049 690b35c 39048->39049 39053 690b5c0 LoadLibraryExW 39048->39053 39054 690b5b2 LoadLibraryExW 39048->39054 39049->39033 39050 690b560 GetModuleHandleW 39052 690b58d 39050->39052 39051 690b354 39051->39049 39051->39050 39052->39033 39053->39051 39054->39051 39056 690d4c6 39055->39056 39057 690d4fe CreateWindowExW 39055->39057 39056->39041 39059 690d634 39057->39059 39059->39059 39061 2f37eaa 39060->39061 39062 2f37ec4 39061->39062 39065 691fa48 39061->39065 39069 691fa3a 39061->39069 39062->38982 39067 691fa5d 39065->39067 39066 691fc72 39066->39062 39067->39066 39068 691fc89 GlobalMemoryStatusEx 39067->39068 39068->39067 39071 691fa5d 39069->39071 39070 691fc72 39070->39062 39071->39070 39072 691fc89 GlobalMemoryStatusEx 39071->39072 39072->39071 38893 15ed030 38894 15ed048 38893->38894 38895 15ed0a2 38894->38895 38900 690d6b7 38894->38900 38904 690a46c 38894->38904 38913 690d6c8 38894->38913 38917 690e818 38894->38917 38901 690d6c8 38900->38901 38902 690a46c CallWindowProcW 38901->38902 38903 690d70f 38902->38903 38903->38895 38905 690a477 38904->38905 38906 690e889 38905->38906 38908 690e879 38905->38908 38942 690e49c 38906->38942 38926 690ea7c 38908->38926 38932 690e9a0 38908->38932 38937 690e9b0 38908->38937 38909 690e887 38914 690d6ee 38913->38914 38915 690a46c CallWindowProcW 38914->38915 38916 690d70f 38915->38916 38916->38895 38918 690e828 38917->38918 38919 690e889 38918->38919 38921 690e879 38918->38921 38920 690e49c CallWindowProcW 38919->38920 38922 690e887 38920->38922 38923 690e9b0 CallWindowProcW 38921->38923 38924 690e9a0 CallWindowProcW 38921->38924 38925 690ea7c CallWindowProcW 38921->38925 38923->38922 38924->38922 38925->38922 38927 690ea3a 38926->38927 38928 690ea8a 38926->38928 38946 690ea58 38927->38946 38950 690ea68 38927->38950 38929 690ea50 38929->38909 38934 690e9b0 38932->38934 38933 690ea50 38933->38909 38935 690ea58 CallWindowProcW 38934->38935 38936 690ea68 CallWindowProcW 38934->38936 38935->38933 38936->38933 38939 690e9c4 38937->38939 38938 690ea50 38938->38909 38940 690ea58 CallWindowProcW 38939->38940 38941 690ea68 CallWindowProcW 38939->38941 38940->38938 38941->38938 38943 690e4a7 38942->38943 38944 690fcea CallWindowProcW 38943->38944 38945 690fc99 38943->38945 38944->38945 38945->38909 38947 690ea68 38946->38947 38948 690ea79 38947->38948 38953 690fc20 38947->38953 38948->38929 38951 690ea79 38950->38951 38952 690fc20 CallWindowProcW 38950->38952 38951->38929 38952->38951 38954 690e49c CallWindowProcW 38953->38954 38955 690fc3a 38954->38955 38955->38948

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 653 6913050-6913071 655 6913073-6913076 653->655 656 6913078-6913097 655->656 657 691309c-691309f 655->657 656->657 658 6913840-6913842 657->658 659 69130a5-69130c4 657->659 660 6913844 658->660 661 6913849-691384c 658->661 667 69130c6-69130c9 659->667 668 69130dd-69130e7 659->668 660->661 661->655 664 6913852-691385b 661->664 667->668 669 69130cb-69130db 667->669 672 69130ed-69130fc 668->672 669->672 780 69130fe call 6913870 672->780 781 69130fe call 6913868 672->781 673 6913103-6913108 674 6913115-69133f2 673->674 675 691310a-6913110 673->675 696 6913832-691383f 674->696 697 69133f8-69134a7 674->697 675->664 706 69134d0 697->706 707 69134a9-69134ce 697->707 709 69134d9-69134ec 706->709 707->709 711 69134f2-6913514 709->711 712 6913819-6913825 709->712 711->712 715 691351a-6913524 711->715 712->697 713 691382b 712->713 713->696 715->712 716 691352a-6913535 715->716 716->712 717 691353b-6913611 716->717 729 6913613-6913615 717->729 730 691361f-691364f 717->730 729->730 734 6913651-6913653 730->734 735 691365d-6913669 730->735 734->735 736 69136c9-69136cd 735->736 737 691366b-691366f 735->737 738 69136d3-691370f 736->738 739 691380a-6913813 736->739 737->736 740 6913671-691369b 737->740 750 6913711-6913713 738->750 751 691371d-691372b 738->751 739->712 739->717 747 69136a9-69136c6 740->747 748 691369d-691369f 740->748 747->736 748->747 750->751 754 6913742-691374d 751->754 755 691372d-6913738 751->755 759 6913765-6913776 754->759 760 691374f-6913755 754->760 755->754 758 691373a 755->758 758->754 764 6913778-691377e 759->764 765 691378e-691379a 759->765 761 6913757 760->761 762 6913759-691375b 760->762 761->759 762->759 766 6913780 764->766 767 6913782-6913784 764->767 769 69137b2-6913803 765->769 770 691379c-69137a2 765->770 766->765 767->765 769->739 771 69137a4 770->771 772 69137a6-69137a8 770->772 771->769 772->769 780->673 781->673
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq
                                      • API String ID: 0-2331353128
                                      • Opcode ID: f3e95f7a0885d818fc55218d526affb16b537a0ff34e73c34ac626315b5b6a19
                                      • Instruction ID: a21eff0c6983a2abefcb635f6cc5f73ef8a5547f13924a26d9fc6818320c97fb
                                      • Opcode Fuzzy Hash: f3e95f7a0885d818fc55218d526affb16b537a0ff34e73c34ac626315b5b6a19
                                      • Instruction Fuzzy Hash: 13322F31E10619CFCB15EF75C85459DB7B6FFC9300F6186AAD409AB664EB30AE85CB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1370 6917d78-6917d96 1371 6917d98-6917d9b 1370->1371 1372 6917da8-6917dab 1371->1372 1373 6917d9d-6917da7 1371->1373 1374 6917dad-6917dc9 1372->1374 1375 6917dce-6917dd1 1372->1375 1374->1375 1376 6917dd3-6917de1 1375->1376 1377 6917de8-6917deb 1375->1377 1384 6917e1e-6917e34 1376->1384 1386 6917de3 1376->1386 1379 6917ded-6917e07 1377->1379 1380 6917e0c-6917e0e 1377->1380 1379->1380 1381 6917e10 1380->1381 1382 6917e15-6917e18 1380->1382 1381->1382 1382->1371 1382->1384 1390 6917e3a-6917e43 1384->1390 1391 691804f-6918059 1384->1391 1386->1377 1392 6917e49-6917e66 1390->1392 1393 691805a-691808f 1390->1393 1402 691803c-6918049 1392->1402 1403 6917e6c-6917e94 1392->1403 1396 6918091-6918094 1393->1396 1397 6918141-6918144 1396->1397 1398 691809a-69180a6 1396->1398 1400 6918167-691816a 1397->1400 1401 6918146-6918162 1397->1401 1404 69180b1-69180b3 1398->1404 1405 6918170-691817f 1400->1405 1406 691839f-69183a1 1400->1406 1401->1400 1402->1390 1402->1391 1403->1402 1424 6917e9a-6917ea3 1403->1424 1407 69180b5-69180bb 1404->1407 1408 69180cb-69180cf 1404->1408 1419 6918181-691819c 1405->1419 1420 691819e-69181e2 1405->1420 1410 69183a3 1406->1410 1411 69183a8-69183ab 1406->1411 1413 69180bd 1407->1413 1414 69180bf-69180c1 1407->1414 1415 69180d1-69180db 1408->1415 1416 69180dd 1408->1416 1410->1411 1411->1396 1417 69183b1-69183ba 1411->1417 1413->1408 1414->1408 1422 69180e2-69180e4 1415->1422 1416->1422 1419->1420 1430 6918373-6918389 1420->1430 1431 69181e8-69181f9 1420->1431 1425 69180e6-69180e9 1422->1425 1426 69180fb-6918134 1422->1426 1424->1393 1428 6917ea9-6917ec5 1424->1428 1425->1417 1426->1405 1449 6918136-6918140 1426->1449 1437 6917ecb-6917ef5 1428->1437 1438 691802a-6918036 1428->1438 1430->1406 1441 69181ff-691821c 1431->1441 1442 691835e-691836d 1431->1442 1453 6918020-6918025 1437->1453 1454 6917efb-6917f23 1437->1454 1438->1402 1438->1424 1441->1442 1451 6918222-6918318 call 6916598 1441->1451 1442->1430 1442->1431 1503 6918326 1451->1503 1504 691831a-6918324 1451->1504 1453->1438 1454->1453 1460 6917f29-6917f57 1454->1460 1460->1453 1466 6917f5d-6917f66 1460->1466 1466->1453 1467 6917f6c-6917f9e 1466->1467 1475 6917fa0-6917fa4 1467->1475 1476 6917fa9-6917fc5 1467->1476 1475->1453 1477 6917fa6 1475->1477 1476->1438 1478 6917fc7-691801e call 6916598 1476->1478 1477->1476 1478->1438 1505 691832b-691832d 1503->1505 1504->1505 1505->1442 1506 691832f-6918334 1505->1506 1507 6918342 1506->1507 1508 6918336-6918340 1506->1508 1509 6918347-6918349 1507->1509 1508->1509 1509->1442 1510 691834b-6918357 1509->1510 1510->1442
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq
                                      • API String ID: 0-2340669324
                                      • Opcode ID: f2ef72278e5c9c946e238cd7652e08faeaf0270f243d3637148acb1532061ca9
                                      • Instruction ID: c19a93ecd9cfa6d0113aabc1c116e041afc46b8fe5f704d658a6ea322c9728a2
                                      • Opcode Fuzzy Hash: f2ef72278e5c9c946e238cd7652e08faeaf0270f243d3637148acb1532061ca9
                                      • Instruction Fuzzy Hash: 03028D30B0021A9FDB54DF68DA94AAEB7E6FF84311F248929D405DB794DB31ED42CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $
                                      • API String ID: 0-3993045852
                                      • Opcode ID: 48e664e3c2ec9438fda0466a193189a141453cf2e99a71a07e6d2b697278b338
                                      • Instruction ID: d1344782a4257da8d30dd9a48c519cdb22c69ce2d014d0f35a9dcd0be5896f66
                                      • Opcode Fuzzy Hash: 48e664e3c2ec9438fda0466a193189a141453cf2e99a71a07e6d2b697278b338
                                      • Instruction Fuzzy Hash: 0822AEB1E002098FDF60DFA4C5806AEBBB6EFC5310F36846AD455AF794DA359C41CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d9f203c4996e39bb8eb5068723522309283e79be7f774616cc566c6e0d180504
                                      • Instruction ID: b254aacafb738164c669aff266f2416ddaf9bf12a90ffd0bf5b3c7faa0cdb532
                                      • Opcode Fuzzy Hash: d9f203c4996e39bb8eb5068723522309283e79be7f774616cc566c6e0d180504
                                      • Instruction Fuzzy Hash: DE628934F002099FDB54DB68D594AADB7F6EB84310F248469E80ADF794DB35ED46CB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eb774123ff62f7ae9ab1aae1f120bd3b0ff9d2052674a62d4baf1f84993d6ea6
                                      • Instruction ID: b76daa93c9a1ccf32d432a504ae4587c3366990bbba0fa1c95cb18763785fe4b
                                      • Opcode Fuzzy Hash: eb774123ff62f7ae9ab1aae1f120bd3b0ff9d2052674a62d4baf1f84993d6ea6
                                      • Instruction Fuzzy Hash: 43327B74A0020DDFDB54DF68D994BADB7B6FB88311F208929E405EB794DB34EC428B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 89cab2715228a5e8b66879036e63bbab8871c769e61c258249558a92eb968b1d
                                      • Instruction ID: 416dc9eec8a27829f45eeb655e7fa34ccd3cfae04108ecc7c31dfe864b941165
                                      • Opcode Fuzzy Hash: 89cab2715228a5e8b66879036e63bbab8871c769e61c258249558a92eb968b1d
                                      • Instruction Fuzzy Hash: 2E223D70E1020D8BDF64DB68D5947AEB7B7EB49310F74882AE409DBB99CA34DC81CB51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 527 691acd0-691acee 528 691acf0-691acf3 527->528 529 691acf5-691acfa 528->529 530 691acfd-691ad00 528->530 529->530 531 691ad10-691ad13 530->531 532 691ad02-691ad0b 530->532 533 691ad15-691ad22 531->533 534 691ad27-691ad2a 531->534 532->531 533->534 535 691ad3b-691ad3e 534->535 536 691ad2c-691ad30 534->536 537 691ad44-691ad47 535->537 538 691aeed-691aef6 535->538 540 691ad36 536->540 541 691aefc-691af06 536->541 542 691ad61-691ad64 537->542 543 691ad49-691ad5c 537->543 538->541 544 691ad8c-691ad95 538->544 540->535 545 691ad87-691ad8a 542->545 546 691ad66-691ad82 542->546 543->542 547 691af07-691af19 544->547 548 691ad9b-691ad9f 544->548 545->544 550 691ada4-691ada6 545->550 546->545 559 691aea4 547->559 560 691af1b-691af3e 547->560 548->550 553 691ada8 550->553 554 691adad-691adb0 550->554 553->554 554->528 555 691adb6-691adda 554->555 570 691ade0-691adef 555->570 571 691aeea 555->571 561 691aeb2-691aee3 559->561 562 691af40-691af43 560->562 561->571 564 691af50-691af53 562->564 565 691af45-691af49 562->565 568 691af62-691af65 564->568 569 691af55 call 691b228 564->569 566 691af91-691afcc 565->566 567 691af4b 565->567 585 691afd2-691afde 566->585 586 691b1bf-691b1d2 566->586 567->564 573 691af67-691af83 568->573 574 691af88-691af8b 568->574 575 691af5b-691af5d 569->575 583 691adf1-691adf7 570->583 584 691ae07-691ae42 call 6916598 570->584 571->538 573->574 574->566 577 691b1f4-691b1f7 574->577 575->568 580 691b204-691b206 577->580 581 691b1f9-691b203 577->581 589 691b208 580->589 590 691b20d-691b210 580->590 591 691adf9 583->591 592 691adfb-691adfd 583->592 609 691ae44-691ae4a 584->609 610 691ae5a-691ae71 584->610 597 691afe0-691aff9 585->597 598 691affe-691b042 585->598 588 691b1d4 586->588 588->577 589->590 590->562 594 691b216-691b220 590->594 591->584 592->584 597->588 616 691b044-691b056 598->616 617 691b05e-691b09d 598->617 612 691ae4c 609->612 613 691ae4e-691ae50 609->613 619 691ae73-691ae79 610->619 620 691ae89-691ae9a 610->620 612->610 613->610 616->617 625 691b0a3-691b17e call 6916598 617->625 626 691b184-691b199 617->626 623 691ae7b 619->623 624 691ae7d-691ae7f 619->624 620->561 630 691ae9c-691aea2 620->630 623->620 624->620 625->626 626->586 630->559 632 691aea6-691aea8 630->632 632->561
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                                      • API String ID: 0-634254105
                                      • Opcode ID: 328dd1703a319a0f788ac62cc370487b118f229a3e91c06aaa54c2db40fc98e0
                                      • Instruction ID: 0691ae792ce9cbd103e68095387c58f9942c7019a87f02578790216367a17af0
                                      • Opcode Fuzzy Hash: 328dd1703a319a0f788ac62cc370487b118f229a3e91c06aaa54c2db40fc98e0
                                      • Instruction Fuzzy Hash: 85E16D70E112198FDB65DB68D8906AEB7B7FF84311F30892AD8099B758DB309D46CB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq
                                      • API String ID: 0-2331353128
                                      • Opcode ID: 64364682475ea6fbb8a3c60dc37ad1287e1b58c01ec7ea532d8795ae66e3f744
                                      • Instruction ID: 92561e6c71d88b139aabfbd2a02d9570f87d9314bde73bf68d049a2fa798177b
                                      • Opcode Fuzzy Hash: 64364682475ea6fbb8a3c60dc37ad1287e1b58c01ec7ea532d8795ae66e3f744
                                      • Instruction Fuzzy Hash: C7025C30E0020E8FDFA4DF68D5906ADB7A6EB45314F30896AE415DFA59DB34EC81CB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 952 6902e02-6902e97 GetCurrentProcess 957 6902ea0-6902ed4 GetCurrentThread 952->957 958 6902e99-6902e9f 952->958 959 6902ed6-6902edc 957->959 960 6902edd-6902f11 GetCurrentProcess 957->960 958->957 959->960 962 6902f13-6902f19 960->962 963 6902f1a-6902f35 call 6902fd8 960->963 962->963 966 6902f3b-6902f6a GetCurrentThreadId 963->966 967 6902f73-6902fd5 966->967 968 6902f6c-6902f72 966->968 968->967
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 06902E86
                                      • GetCurrentThread.KERNEL32 ref: 06902EC3
                                      • GetCurrentProcess.KERNEL32 ref: 06902F00
                                      • GetCurrentThreadId.KERNEL32 ref: 06902F59
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: e277ebc467d03efe70f12b89cfb8c8071351663f2487ca4b4a61225e5cdd5e40
                                      • Instruction ID: 53a20d0765a2d96642fa7f664611995688ebd2957f9193fd4fd7181f0d89a8dd
                                      • Opcode Fuzzy Hash: e277ebc467d03efe70f12b89cfb8c8071351663f2487ca4b4a61225e5cdd5e40
                                      • Instruction Fuzzy Hash: 115157B09003098FDB54DFA9D948BEEBBF5EF88310F208459E519A7390D7745984CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 975 6902e08-6902e97 GetCurrentProcess 979 6902ea0-6902ed4 GetCurrentThread 975->979 980 6902e99-6902e9f 975->980 981 6902ed6-6902edc 979->981 982 6902edd-6902f11 GetCurrentProcess 979->982 980->979 981->982 984 6902f13-6902f19 982->984 985 6902f1a-6902f35 call 6902fd8 982->985 984->985 988 6902f3b-6902f6a GetCurrentThreadId 985->988 989 6902f73-6902fd5 988->989 990 6902f6c-6902f72 988->990 990->989
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 06902E86
                                      • GetCurrentThread.KERNEL32 ref: 06902EC3
                                      • GetCurrentProcess.KERNEL32 ref: 06902F00
                                      • GetCurrentThreadId.KERNEL32 ref: 06902F59
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: aa5de9dfd0a5c3432a59eca91d056b572222e07582a98d431836b5e240518b5c
                                      • Instruction ID: ac943b15ad912849abc6bab07b72755feeb8cfbad25ed1593b8ece46eb255e25
                                      • Opcode Fuzzy Hash: aa5de9dfd0a5c3432a59eca91d056b572222e07582a98d431836b5e240518b5c
                                      • Instruction Fuzzy Hash: 6E5157B09003098FDB54DFA9D948BEEBBF5FF88310F208459E519A7290D7745984CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 997 6919150-6919175 998 6919177-691917a 997->998 999 6919180-6919195 998->999 1000 6919a38-6919a3b 998->1000 1006 6919197-691919d 999->1006 1007 69191ad-69191c3 999->1007 1001 6919a61-6919a63 1000->1001 1002 6919a3d-6919a5c 1000->1002 1004 6919a65 1001->1004 1005 6919a6a-6919a6d 1001->1005 1002->1001 1004->1005 1005->998 1009 6919a73-6919a7d 1005->1009 1010 69191a1-69191a3 1006->1010 1011 691919f 1006->1011 1014 69191ce-69191d0 1007->1014 1010->1007 1011->1007 1015 69191d2-69191d8 1014->1015 1016 69191e8-6919259 1014->1016 1017 69191da 1015->1017 1018 69191dc-69191de 1015->1018 1027 6919285-69192a1 1016->1027 1028 691925b-691927e 1016->1028 1017->1016 1018->1016 1033 69192a3-69192c6 1027->1033 1034 69192cd-69192e8 1027->1034 1028->1027 1033->1034 1039 6919313-691932e 1034->1039 1040 69192ea-691930c 1034->1040 1045 6919330-691934c 1039->1045 1046 6919353-6919361 1039->1046 1040->1039 1045->1046 1047 6919371-69193eb 1046->1047 1048 6919363-691936c 1046->1048 1054 6919438-691944d 1047->1054 1055 69193ed-691940b 1047->1055 1048->1009 1054->1000 1059 6919427-6919436 1055->1059 1060 691940d-691941c 1055->1060 1059->1054 1059->1055 1060->1059
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq
                                      • API String ID: 0-185584874
                                      • Opcode ID: 62f72cba26351b789b74af596b808c77f619c28ca0cc0453067c5d06e5c227c7
                                      • Instruction ID: 538235200e689c0a0cd5f1da676951ccee3aae9540c4dca069a5c7913cb9e2ae
                                      • Opcode Fuzzy Hash: 62f72cba26351b789b74af596b808c77f619c28ca0cc0453067c5d06e5c227c7
                                      • Instruction Fuzzy Hash: 96914230B1021E9FDB54DF64D964BAEB7F6AF85604F208469D80DEB384EE70DD428B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1063 691cf40-691cf5b 1064 691cf5d-691cf60 1063->1064 1065 691cf62-691cf64 1064->1065 1066 691cf6f-691cf72 1064->1066 1067 691d2e7-691d2f0 1065->1067 1068 691cf6a 1065->1068 1069 691cf74-691cf83 1066->1069 1070 691cfbb-691cfbe 1066->1070 1073 691d2f2-691d2f7 1067->1073 1074 691d2ff-691d30b 1067->1074 1068->1066 1071 691cf92-691cf9e 1069->1071 1072 691cf85-691cf8a 1069->1072 1075 691cfc0-691d002 1070->1075 1076 691d007-691d00a 1070->1076 1077 691cfa4-691cfb6 1071->1077 1078 691d95d-691d996 1071->1078 1072->1071 1073->1074 1081 691d311-691d325 1074->1081 1082 691d41c-691d421 1074->1082 1075->1076 1079 691d053-691d056 1076->1079 1080 691d00c-691d04e 1076->1080 1077->1070 1093 691d998-691d99b 1078->1093 1083 691d058-691d09a 1079->1083 1084 691d09f-691d0a2 1079->1084 1080->1079 1094 691d429 1081->1094 1098 691d32b-691d33d 1081->1098 1082->1094 1083->1084 1091 691d0a4-691d0e6 1084->1091 1092 691d0eb-691d0ee 1084->1092 1091->1092 1096 691d0f0-691d0f2 1092->1096 1097 691d0fd-691d100 1092->1097 1102 691d99d-691d9b9 1093->1102 1103 691d9be-691d9c1 1093->1103 1101 691d42c-691d438 1094->1101 1096->1094 1105 691d0f8 1096->1105 1106 691d102-691d118 1097->1106 1107 691d11d-691d120 1097->1107 1122 691d361-691d363 1098->1122 1123 691d33f-691d345 1098->1123 1110 691d206-691d215 1101->1110 1111 691d43e-691d72b 1101->1111 1102->1103 1115 691d9d0-691d9d3 1103->1115 1116 691d9c3 call 691dab5 1103->1116 1105->1097 1106->1107 1112 691d122-691d164 1107->1112 1113 691d169-691d16c 1107->1113 1118 691d224-691d230 1110->1118 1119 691d217-691d21c 1110->1119 1275 691d731-691d737 1111->1275 1276 691d952-691d95c 1111->1276 1112->1113 1120 691d1b5-691d1b8 1113->1120 1121 691d16e-691d1b0 1113->1121 1126 691d9d5-691da01 1115->1126 1127 691da06-691da08 1115->1127 1137 691d9c9-691d9cb 1116->1137 1118->1078 1131 691d236-691d248 1118->1131 1119->1118 1138 691d201-691d204 1120->1138 1139 691d1ba-691d1fc 1120->1139 1121->1120 1135 691d36d-691d379 1122->1135 1132 691d347 1123->1132 1133 691d349-691d355 1123->1133 1126->1127 1140 691da0a 1127->1140 1141 691da0f-691da12 1127->1141 1144 691d24d-691d250 1131->1144 1146 691d357-691d35f 1132->1146 1133->1146 1165 691d387 1135->1165 1166 691d37b-691d385 1135->1166 1137->1115 1138->1110 1138->1144 1139->1138 1140->1141 1141->1093 1142 691da14-691da23 1141->1142 1171 691da25-691da88 call 6916598 1142->1171 1172 691da8a-691da9f 1142->1172 1153 691d252-691d294 1144->1153 1154 691d299-691d29c 1144->1154 1146->1135 1153->1154 1167 691d2bf-691d2c2 1154->1167 1168 691d29e-691d2ba 1154->1168 1177 691d38c-691d38e 1165->1177 1166->1177 1167->1101 1170 691d2c8-691d2cb 1167->1170 1168->1167 1178 691d2d5-691d2d7 1170->1178 1179 691d2cd-691d2d2 1170->1179 1171->1172 1177->1094 1183 691d394-691d3b0 call 6916598 1177->1183 1186 691d2d9 1178->1186 1187 691d2de-691d2e1 1178->1187 1179->1178 1204 691d3b2-691d3b7 1183->1204 1205 691d3bf-691d3cb 1183->1205 1186->1187 1187->1064 1187->1067 1204->1205 1205->1082 1210 691d3cd-691d41a 1205->1210 1210->1094 1277 691d746-691d74f 1275->1277 1278 691d739-691d73e 1275->1278 1277->1078 1279 691d755-691d768 1277->1279 1278->1277 1281 691d942-691d94c 1279->1281 1282 691d76e-691d774 1279->1282 1281->1275 1281->1276 1283 691d783-691d78c 1282->1283 1284 691d776-691d77b 1282->1284 1283->1078 1285 691d792-691d7b3 1283->1285 1284->1283 1288 691d7c2-691d7cb 1285->1288 1289 691d7b5-691d7ba 1285->1289 1288->1078 1290 691d7d1-691d7ee 1288->1290 1289->1288 1290->1281 1293 691d7f4-691d7fa 1290->1293 1293->1078 1294 691d800-691d819 1293->1294 1296 691d935-691d93c 1294->1296 1297 691d81f-691d846 1294->1297 1296->1281 1296->1293 1297->1078 1300 691d84c-691d856 1297->1300 1300->1078 1301 691d85c-691d873 1300->1301 1303 691d882-691d89d 1301->1303 1304 691d875-691d880 1301->1304 1303->1296 1309 691d8a3-691d8bc call 6916598 1303->1309 1304->1303 1313 691d8cb-691d8d4 1309->1313 1314 691d8be-691d8c3 1309->1314 1313->1078 1315 691d8da-691d92e 1313->1315 1314->1313 1315->1296
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq
                                      • API String ID: 0-2861643491
                                      • Opcode ID: 5df227c7f6d49f2c835429bac28c04f7cb5622cad9b2464170755d76a3439fd2
                                      • Instruction ID: c9070e2935d5948238d1b8eba8a1ebe6fe6d64e8365a8464a7f357694712613f
                                      • Opcode Fuzzy Hash: 5df227c7f6d49f2c835429bac28c04f7cb5622cad9b2464170755d76a3439fd2
                                      • Instruction Fuzzy Hash: 7B627270B0021A8FCB55EF68D590A5EB7F2FF85311B208968D4099F759DB71ED86CB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1323 6914b60-6914b84 1324 6914b86-6914b89 1323->1324 1325 6915268-691526b 1324->1325 1326 6914b8f-6914c87 1324->1326 1327 691526d-6915287 1325->1327 1328 691528c-691528e 1325->1328 1346 6914d0a-6914d11 1326->1346 1347 6914c8d-6914cda call 6915411 1326->1347 1327->1328 1330 6915290 1328->1330 1331 6915295-6915298 1328->1331 1330->1331 1331->1324 1333 691529e-69152ab 1331->1333 1348 6914d95-6914d9e 1346->1348 1349 6914d17-6914d87 1346->1349 1360 6914ce0-6914cfc 1347->1360 1348->1333 1366 6914d92 1349->1366 1367 6914d89 1349->1367 1363 6914d07-6914d08 1360->1363 1364 6914cfe 1360->1364 1363->1346 1364->1363 1366->1348 1367->1366
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fiq$XPiq$\Oiq
                                      • API String ID: 0-1639307521
                                      • Opcode ID: 9905ea70ce3cc123f668d2bfd7c1338c3282f84512d7856b4c48d4dc45c0fd04
                                      • Instruction ID: b0331418de6a82495055b6ab3d9a43c0fb670c990348886938c453227ef3c95c
                                      • Opcode Fuzzy Hash: 9905ea70ce3cc123f668d2bfd7c1338c3282f84512d7856b4c48d4dc45c0fd04
                                      • Instruction Fuzzy Hash: 0F616C71E002199FEF549FA9C8147AEBBF6FF88700F20842AD506EB395DA719C45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1744 6919140-6919175 1746 6919177-691917a 1744->1746 1747 6919180-6919195 1746->1747 1748 6919a38-6919a3b 1746->1748 1754 6919197-691919d 1747->1754 1755 69191ad-69191c3 1747->1755 1749 6919a61-6919a63 1748->1749 1750 6919a3d-6919a5c 1748->1750 1752 6919a65 1749->1752 1753 6919a6a-6919a6d 1749->1753 1750->1749 1752->1753 1753->1746 1757 6919a73-6919a7d 1753->1757 1758 69191a1-69191a3 1754->1758 1759 691919f 1754->1759 1762 69191ce-69191d0 1755->1762 1758->1755 1759->1755 1763 69191d2-69191d8 1762->1763 1764 69191e8-6919259 1762->1764 1765 69191da 1763->1765 1766 69191dc-69191de 1763->1766 1775 6919285-69192a1 1764->1775 1776 691925b-691927e 1764->1776 1765->1764 1766->1764 1781 69192a3-69192c6 1775->1781 1782 69192cd-69192e8 1775->1782 1776->1775 1781->1782 1787 6919313-691932e 1782->1787 1788 69192ea-691930c 1782->1788 1793 6919330-691934c 1787->1793 1794 6919353-6919361 1787->1794 1788->1787 1793->1794 1795 6919371-69193eb 1794->1795 1796 6919363-691936c 1794->1796 1802 6919438-691944d 1795->1802 1803 69193ed-691940b 1795->1803 1796->1757 1802->1748 1807 6919427-6919436 1803->1807 1808 691940d-691941c 1803->1808 1807->1802 1807->1803 1808->1807
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq
                                      • API String ID: 0-2340669324
                                      • Opcode ID: 4ada7519c01997dbc059f62497eaf03a6a6ac53efb95f4f5bd65ad54d0d3d927
                                      • Instruction ID: 457003c2baa4d0e79f064fafda3409bb3f195841e3dfc63ed15bf88ec17eee78
                                      • Opcode Fuzzy Hash: 4ada7519c01997dbc059f62497eaf03a6a6ac53efb95f4f5bd65ad54d0d3d927
                                      • Instruction Fuzzy Hash: 52517430B0010A9FDB54DF74D964B6EB7FAAFC9650F208469C809DB398EA30DD42CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0690B57E
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 6d972b0dc0aa3997728fa68ac08459f9617c421d42e75da699aaf7266d754fff
                                      • Instruction ID: 02ecc99b360e3677476816ed011fa39fdd075a89d2c9086383c5c131fbc527ad
                                      • Opcode Fuzzy Hash: 6d972b0dc0aa3997728fa68ac08459f9617c421d42e75da699aaf7266d754fff
                                      • Instruction Fuzzy Hash: 9981AA70A00B059FE7A4DF2AD44075ABBF5FF88300F108A2DD48AD7A94DB36E945CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0690D622
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: a704e17a3bdb8e7448c54fc3e82b8db5b784fd4e798d9f46a6bf946993499f91
                                      • Instruction ID: 108eefde11dcfab0d36ca2e5f0be82a5823eab2528c5cfbd1e9c5e9b514b9036
                                      • Opcode Fuzzy Hash: a704e17a3bdb8e7448c54fc3e82b8db5b784fd4e798d9f46a6bf946993499f91
                                      • Instruction Fuzzy Hash: 795111B5C00249AFDF15CF99C980ADDBFB6FF48300F24816AE818AB261D7719955CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2886402100.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2f30000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c44524201202fb47917f7aee29de09ef63ddae246d49d692253379341d372ce
                                      • Instruction ID: 70d69cf82d2235393c94443a894bd13ea27c9244d2dba82cebb9813d761829a8
                                      • Opcode Fuzzy Hash: 4c44524201202fb47917f7aee29de09ef63ddae246d49d692253379341d372ce
                                      • Instruction Fuzzy Hash: F1413272D0038A8FCB05DFA9D8006EEBBF5AFC9310F15856AD944A7381DB389844CBE1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0690D622
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: c7e3c0ed2f99b5e26dd51c6b3ca7549f2efe5bb4b73568c5da716f5aa837903d
                                      • Instruction ID: 916860f1a1f9623f5ad77c388f57b0335e2fb7c68e0f428018e29bda9f87c572
                                      • Opcode Fuzzy Hash: c7e3c0ed2f99b5e26dd51c6b3ca7549f2efe5bb4b73568c5da716f5aa837903d
                                      • Instruction Fuzzy Hash: 9F41DEB5C00309DFDB14CF99C884ADEBBB5FF88310F24812AE819AB250D771A945CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 0690FD11
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: CallProcWindow
                                      • String ID:
                                      • API String ID: 2714655100-0
                                      • Opcode ID: ecc807976f08818bc86c966fb315e998cfbbd62d81adf57d93998ba1cf8148be
                                      • Instruction ID: db394445ed834ef5b6c0edfb828b58c56504c86789d8cbd71b1f4f9edf2bcac9
                                      • Opcode Fuzzy Hash: ecc807976f08818bc86c966fb315e998cfbbd62d81adf57d93998ba1cf8148be
                                      • Instruction Fuzzy Hash: 8A416DB4900305CFDB54CF59C449AAABBF5FF88314F24C859D919AB761C774A941CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069030D7
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 22886c4a0624ad0c7f34903acf13fe4a689eb8a4e8a29d267246f2145639c9d6
                                      • Instruction ID: 25dd982f2bdbc3c2fdf25428e06a44020fb5c991706406959617838bbd2b6fb5
                                      • Opcode Fuzzy Hash: 22886c4a0624ad0c7f34903acf13fe4a689eb8a4e8a29d267246f2145639c9d6
                                      • Instruction Fuzzy Hash: A121D2B5D002099FDB10CFAAD984ADEFBF8EB48320F14841AE959A3250D375A954CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069030D7
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 6e313cbef4dc4bfd796e68ac4a7f6c5ad9857fd91a733a12948c0eba62bf9f4e
                                      • Instruction ID: 2e2b2ffbaeaabb5e8b77466b2966b5e9429dcfa5e676d53b6dacab467a4ea0e6
                                      • Opcode Fuzzy Hash: 6e313cbef4dc4bfd796e68ac4a7f6c5ad9857fd91a733a12948c0eba62bf9f4e
                                      • Instruction Fuzzy Hash: 8F21E4B5D003099FDB10CF9AD884ADEFBF8EB48310F14801AE918A3350C375A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0690B5F9,00000800,00000000,00000000), ref: 0690B7EA
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 5e21a1efceaa3b7e2a8dd27245cf7c12355a747700637052d499a544f7e6fe3e
                                      • Instruction ID: 33e73fa0cd01b0dd597aca1f568d41e646a84a24ec920b93cf6b8e65bf919241
                                      • Opcode Fuzzy Hash: 5e21a1efceaa3b7e2a8dd27245cf7c12355a747700637052d499a544f7e6fe3e
                                      • Instruction Fuzzy Hash: E81103B6C003098FDB10CF9AD844A9EFBF8EB48310F10842ED929A7640C375A944CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0690B5F9,00000800,00000000,00000000), ref: 0690B7EA
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 8422b26ff19594956a3d07dadc64a1a274628b3ce2d25a1a6f61c64dde177519
                                      • Instruction ID: bab70fc821f7c1448c95f356ae4e93f2f1293a6a2da1a3fb6ba8e4faca1a2573
                                      • Opcode Fuzzy Hash: 8422b26ff19594956a3d07dadc64a1a274628b3ce2d25a1a6f61c64dde177519
                                      • Instruction Fuzzy Hash: 621126BAC003499FDB10CFAAD844ADEFBF8EB48310F20842ED569A7640C775A545CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GlobalMemoryStatusEx.KERNELBASE ref: 02F3EC57
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2886402100.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2f30000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: GlobalMemoryStatus
                                      • String ID:
                                      • API String ID: 1890195054-0
                                      • Opcode ID: 1397b25e13e761cddcef61a0074d7bbe58e349eb1dea7d13cc6b1943d24b0113
                                      • Instruction ID: 1e7fff3356d3bd15a91ef525232fc9de2c63731ad16153a66a283a70b6f1c81b
                                      • Opcode Fuzzy Hash: 1397b25e13e761cddcef61a0074d7bbe58e349eb1dea7d13cc6b1943d24b0113
                                      • Instruction Fuzzy Hash: E81112B1C002599BCB10DF9AC544B9EFBF4AF48320F15816AD928B7240D378A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0690B57E
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891648701.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6900000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: d14e740a015330c4a5dab12392aabdd959b8900bdcf8b00c5ddb0914a06dc640
                                      • Instruction ID: 9973653fa89056a2916d2c93dd74c19dcdb3f31b0b2f445a725e2ec911ae6752
                                      • Opcode Fuzzy Hash: d14e740a015330c4a5dab12392aabdd959b8900bdcf8b00c5ddb0914a06dc640
                                      • Instruction Fuzzy Hash: 7A11E3B9C003498FDB10DF9AD444ADEFBF8EB88314F14845AD419A7650D379A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: XPiq
                                      • API String ID: 0-3497805733
                                      • Opcode ID: 326940f3dc129d621f9d8294acc6a363d9c38f330fe9a124533010a21783fbca
                                      • Instruction ID: 5d102a6a90e9c1753f79de9a5812b91423130731f66e57c1af7ba446a34cd5b4
                                      • Opcode Fuzzy Hash: 326940f3dc129d621f9d8294acc6a363d9c38f330fe9a124533010a21783fbca
                                      • Instruction Fuzzy Hash: 0C416F71E102099FDB55DFB9C814BAEBBF6FF88700F208529E105AB395DA719C05CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHdq
                                      • API String ID: 0-2991842255
                                      • Opcode ID: e485be45e3991d464c2505b73dd3b856fd54bee9437a8f2e8d9ac3d7d63854d0
                                      • Instruction ID: ef24ebefd6839dddb5346da5f545c3c1e00066ef7dc91e83dace549c521d94ad
                                      • Opcode Fuzzy Hash: e485be45e3991d464c2505b73dd3b856fd54bee9437a8f2e8d9ac3d7d63854d0
                                      • Instruction Fuzzy Hash: 7C418F70E0025A9FDF61DF65D4546AEBBB6BF85300F34492AE416EB640DB70984ACB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHdq
                                      • API String ID: 0-2991842255
                                      • Opcode ID: bb9b52230f55db3e9868df136fa361c10547c4e3aa9f464a332576ca8d791aed
                                      • Instruction ID: 572210d059ef4ad2cb0dbf26d7fed8383ca7a01932e8e25e1b96d79f953265a1
                                      • Opcode Fuzzy Hash: bb9b52230f55db3e9868df136fa361c10547c4e3aa9f464a332576ca8d791aed
                                      • Instruction Fuzzy Hash: 9331FE30B102098FDF59AB74C45466E3BABAB89601F34882CD406DF398EF30DD86CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 27cbf827200457c20976122a5eb880f58964b280f297b46e0b5706d95d38f124
                                      • Instruction ID: ff04fb73ba4730e79bccd437de76bddcf2c5f2ce6699902bd2bcd8064739fda2
                                      • Opcode Fuzzy Hash: 27cbf827200457c20976122a5eb880f58964b280f297b46e0b5706d95d38f124
                                      • Instruction Fuzzy Hash: 60925534A002088FDB64EB68C194B6DB7F6FB45314F6488A9D419EF7A5DB35ED81CB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa8d620f71ea717f47f7d7b5a0c9e6d4ec3928ba9f8240396caac6ed8f3c78db
                                      • Instruction ID: 5f683cdb0ac53147c127ceb1579965eafc0bbdf5e697736099d42733b8d134d3
                                      • Opcode Fuzzy Hash: aa8d620f71ea717f47f7d7b5a0c9e6d4ec3928ba9f8240396caac6ed8f3c78db
                                      • Instruction Fuzzy Hash: EA618EB1F001254FDF549B6EC88066FAADBAFD5220B254439D80EDB364DEA5ED4287C1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3aa85e2fe1aa596e4a0255d7653a6ff389330725ff6a1eb4f4a771ec59681ef
                                      • Instruction ID: 51381d83dcb7b7aa8183e6f4edbcc76bfe69b0c2d1e85f65122b1852e27bae55
                                      • Opcode Fuzzy Hash: b3aa85e2fe1aa596e4a0255d7653a6ff389330725ff6a1eb4f4a771ec59681ef
                                      • Instruction Fuzzy Hash: 15813E70B006099FDB54DFA8D5546AEB7F7AF89700F208529D40AEF798EA34DC428B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 215f8dfe0aaa385019caa1bd1595cb3044b6427ace2f5e48ab9343c7eec1a92c
                                      • Instruction ID: a19977519a929f4c7ffdf66af3345d695a4751b599b1fb414bc5e6c22e5fe1bb
                                      • Opcode Fuzzy Hash: 215f8dfe0aaa385019caa1bd1595cb3044b6427ace2f5e48ab9343c7eec1a92c
                                      • Instruction Fuzzy Hash: 6A914C70E102198FDF60DF68C890B9DB7B1FF89310F20859AD549AB395DB70AA85CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c01f6ea2b0c6988cddb196686cdaa643dc91e8d8b4046eb584d08b03380acdc
                                      • Instruction ID: 3e3db4b9ced5a05b7e367304e0f07be8c7c391ec78cf06b2c71cbd6fd66ec07c
                                      • Opcode Fuzzy Hash: 2c01f6ea2b0c6988cddb196686cdaa643dc91e8d8b4046eb584d08b03380acdc
                                      • Instruction Fuzzy Hash: 89914B70E106198BDF60DF68C890B9DB7B1FF89310F208699D509BB395DB70AA85CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 63f8fff17230a072f5fac62d2cd14f443f3c485a083065cbbad2d3c2ed0fb11d
                                      • Instruction ID: 8c3b68295d53db79a9913d2c43e15031e4de849e39d0d6749c3f4b3d0979f51b
                                      • Opcode Fuzzy Hash: 63f8fff17230a072f5fac62d2cd14f443f3c485a083065cbbad2d3c2ed0fb11d
                                      • Instruction Fuzzy Hash: 6B713A70A002099FDB54DBA9C990AAEBBF6FF88300F248529D415EB754DA30ED46CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 41e7b21982debe76a8cd0dbf36ca65663445e15130dbe6b951892f56a3dbf66f
                                      • Instruction ID: 32e54fcaf6cc96a668e3693bc96da771c836cf723707be213f4e85966b6977f1
                                      • Opcode Fuzzy Hash: 41e7b21982debe76a8cd0dbf36ca65663445e15130dbe6b951892f56a3dbf66f
                                      • Instruction Fuzzy Hash: E571F970A0020D9FDB55DBA9D990AAEBBF6FF88300F248529D419EB754DB30ED46CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0796e696f2b0854b859c8be4273c0a46b9d4ae1677c8e2c8fabfc1737211a448
                                      • Instruction ID: 058f48e84ddc837dffa93790196ff60a1121b92267e544bef8bef7723730df14
                                      • Opcode Fuzzy Hash: 0796e696f2b0854b859c8be4273c0a46b9d4ae1677c8e2c8fabfc1737211a448
                                      • Instruction Fuzzy Hash: 5151CE35E0010D9FCF64EBB8E4446BEBBF6EB84315F30886AE50ADB651DB318955CB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc04ab70b239c00c9baa894f05adec25cacf772e1161f5f1a905afed92289fdb
                                      • Instruction ID: 2648e3b2582eabc77e1e283e3d9e74c12de690b7ff0f31e91d59d8f635e12b4a
                                      • Opcode Fuzzy Hash: cc04ab70b239c00c9baa894f05adec25cacf772e1161f5f1a905afed92289fdb
                                      • Instruction Fuzzy Hash: 8E51C570B2021C5BEF60666CD86476F3AEED789311F30452AD50EDB795CB68CC4167A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f371bd13e3c621573349ad46e0de7aa823780ad032296444bb44160b65c04d6b
                                      • Instruction ID: 1bc244b887a35e8c88e3804776ef8be2a5f314b3c16c93974a34d2a1fb87f3bd
                                      • Opcode Fuzzy Hash: f371bd13e3c621573349ad46e0de7aa823780ad032296444bb44160b65c04d6b
                                      • Instruction Fuzzy Hash: 1A51A070B2021D9BEF64666CD8A476F36DEE78D311F30052AD50EDBB94CB68CC4167A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 27b961711fbb3db43186ca9643deb474f1a661808834ef6e6f429ac181d6909b
                                      • Instruction ID: ca29ff736b888596f1a041fde90d413b6a03a47106e4b6f04a6508bcd86b5277
                                      • Opcode Fuzzy Hash: 27b961711fbb3db43186ca9643deb474f1a661808834ef6e6f429ac181d6909b
                                      • Instruction Fuzzy Hash: DD414FB1E006098FDF60CF99D8806AFF7B6EF85310F61492AD156DBA50D330E8558B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f752f2b221c6bf531b3aca6ae06d5dffb8cd5e0339c6fd1519ead37a768ddbcc
                                      • Instruction ID: 38dbf99cb38c17ccd9a15d1c898380ff7a3a59adbc6fd9128c2d8fbfe08ce849
                                      • Opcode Fuzzy Hash: f752f2b221c6bf531b3aca6ae06d5dffb8cd5e0339c6fd1519ead37a768ddbcc
                                      • Instruction Fuzzy Hash: FE319034E102099FCB58DF64C85469EB7F2FF89310F608519E906EBB40DB71AD82CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 86bdec1fa25136014dfe5ab677c0b95e6785701f495a8f05906d2529987484f2
                                      • Instruction ID: 4431fb5a31f7393cb73f01c938ad2e2827189513ec438ac28f2ad1030a074b6d
                                      • Opcode Fuzzy Hash: 86bdec1fa25136014dfe5ab677c0b95e6785701f495a8f05906d2529987484f2
                                      • Instruction Fuzzy Hash: ED31A234E102099FCB58DF68C85469EB7B2FF89300F20C519E906EB754DB71AD82CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 652569fcaf51fc50451f788db49a317599551e38e1dc0f42b2f6383d0f756a26
                                      • Instruction ID: b05c6357430a6cce735ab6730650da10d431c4eab6176e1e68e6955484507649
                                      • Opcode Fuzzy Hash: 652569fcaf51fc50451f788db49a317599551e38e1dc0f42b2f6383d0f756a26
                                      • Instruction Fuzzy Hash: D6318B75F012099FDB50DFB9D880AAEBBF6AB88310F208439E945EB754E730DC418B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6334e10474f15618e2fde6eda3e0fc58678f282a45444c6adda5a1eee29ec4a1
                                      • Instruction ID: 0457052953da67edd17ae961b4088ba27ef3e2a92edb3e8a9739af2a72f687de
                                      • Opcode Fuzzy Hash: 6334e10474f15618e2fde6eda3e0fc58678f282a45444c6adda5a1eee29ec4a1
                                      • Instruction Fuzzy Hash: E8217A75F016199FDB50DF79D990AAEBBFAEB88610F208439E905EB754E770DC008B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2886175814.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_15ed000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cb0b35a5da0b52301b9cb1b8ecdff0e88b205d364eb43cb25f7fdd6e7763169e
                                      • Instruction ID: 4b160d4e87d2647bf348986dcb796dd1fa65dc5b78a39da75d3e551fc2ea6645
                                      • Opcode Fuzzy Hash: cb0b35a5da0b52301b9cb1b8ecdff0e88b205d364eb43cb25f7fdd6e7763169e
                                      • Instruction Fuzzy Hash: 132103B5A04200DFCB19DF58D988B26BFF5FB84314F28C96DD80A0E282D336D406CA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f5037f100a9cee8198eee8c8e6ce47e5324cd05c616e22468a257afdadd2c228
                                      • Instruction ID: b791745e8e8e976461ea491c15e0259ea2582310c6a7fea463be00f944ccc32a
                                      • Opcode Fuzzy Hash: f5037f100a9cee8198eee8c8e6ce47e5324cd05c616e22468a257afdadd2c228
                                      • Instruction Fuzzy Hash: 69217C34B1011A9BDB94EBA8E8546ADBBB6EB84310F34842AD409DF744D631AC518B80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 71ec34cb29b4fd1a674ca38d570f866b112e745e38f3b689e152532a3c3e6a44
                                      • Instruction ID: 6e196b5a68046117c3a29c498433a38d3b81655528409d71201f1f60e6ce6813
                                      • Opcode Fuzzy Hash: 71ec34cb29b4fd1a674ca38d570f866b112e745e38f3b689e152532a3c3e6a44
                                      • Instruction Fuzzy Hash: B1219034F1011D9BDF54EAA9E8546ADBBBAEB84310F348429D409DF744D731AD458B81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2886175814.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_15ed000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73e193cde08eec6ca6b2ab8a5bfbaa2b18bac8fb943199e654815ea089cb9c32
                                      • Instruction ID: 54dbb17ca4f520c01d2eec4f15109fbc09c76fa3aa6c9fc56233717103663f11
                                      • Opcode Fuzzy Hash: 73e193cde08eec6ca6b2ab8a5bfbaa2b18bac8fb943199e654815ea089cb9c32
                                      • Instruction Fuzzy Hash: 0D2160755093C08FD707CF64C994715BF71AF46214F29C5EBD8898F2A3C23A980ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c0da94f52a0b1e6206fa8b79c391083fdaaed062bba641b4e8e749f7ac4f7a5
                                      • Instruction ID: 74bc26571e6e71e9eb9a8939d33ee6ac762094fab53e4b5502e38de9945f3f9a
                                      • Opcode Fuzzy Hash: 2c0da94f52a0b1e6206fa8b79c391083fdaaed062bba641b4e8e749f7ac4f7a5
                                      • Instruction Fuzzy Hash: 4911E131B0402C9BDF589A78D8146BE77FAEBC8610F208539D80AEB344EE74CC028B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 978fa28d60fb09545f392aea4d16200e6cf178e33848cd805ec4ce3dd96d7671
                                      • Instruction ID: e2ddf47b1fa451b977992e24b4e265c4d45938986ad05e6e376a8f3e8aebe589
                                      • Opcode Fuzzy Hash: 978fa28d60fb09545f392aea4d16200e6cf178e33848cd805ec4ce3dd96d7671
                                      • Instruction Fuzzy Hash: EF012470B141151FDB658ABCD55576AB7DADBCDB20F30883AE00ECB785DD25CC424391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e45fe010a90940ae4918bed2728a8e40f946b296f3ea657edc9d53bc02804762
                                      • Instruction ID: e403039611440e8142a10eb07f10988f22cc8be531039bcbb93b31e886de1f35
                                      • Opcode Fuzzy Hash: e45fe010a90940ae4918bed2728a8e40f946b296f3ea657edc9d53bc02804762
                                      • Instruction Fuzzy Hash: 2D21F4B5C01259AFCB00DF9AD884ADEFFF8FB49310F10812AE918A7241C3746554CBA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7d969764d9255fc764f3066232595c4c19be2fbbba7cfc2320ba93d5a278cbe5
                                      • Instruction ID: b2bd37f239d54f9ea7fc9954b43a76b0e5017e83dfe77fbdf146f304f2b29033
                                      • Opcode Fuzzy Hash: 7d969764d9255fc764f3066232595c4c19be2fbbba7cfc2320ba93d5a278cbe5
                                      • Instruction Fuzzy Hash: 8201BC74B141194FCB65DA2C9890B6E77EADBC9620F20882EE94BCB345DE21DC428391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f569145c1c86ad69ad900444f704252eb0e2e0f642580f7e9dc778777ce21e49
                                      • Instruction ID: da36df06c0141034b5d2df00a2e24ac9a488d5903a7b4298a2344c354aa1138c
                                      • Opcode Fuzzy Hash: f569145c1c86ad69ad900444f704252eb0e2e0f642580f7e9dc778777ce21e49
                                      • Instruction Fuzzy Hash: A301D475B140199BDF949A78D9112FF77EADBC8710F20043AC406E7684EE78CC0247A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 89645750df1197970ad5867d0aeed981f67ab7a53bde8d4c5b25fe5779f19b05
                                      • Instruction ID: d12918522a075fabd53802b70f1bad79eae829d53349d3b479a681cf8d150828
                                      • Opcode Fuzzy Hash: 89645750df1197970ad5867d0aeed981f67ab7a53bde8d4c5b25fe5779f19b05
                                      • Instruction Fuzzy Hash: FC01F770B151194FCB62DA3CE86471F7BE6EB86720F30886DE14ACB755EA21DC438381
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c2e683ea3d4838923c1580c0ff6bff6d9c633018ed5f198cc457b9578539ce8
                                      • Instruction ID: e034d7f2af06d3c4997e75a22ae0abebc8ec61fcb42ff6b0907c20645d439168
                                      • Opcode Fuzzy Hash: 4c2e683ea3d4838923c1580c0ff6bff6d9c633018ed5f198cc457b9578539ce8
                                      • Instruction Fuzzy Hash: 5E11D3B5D01219AFCB00DF9AD884ACEFFF8FB49310F10812AE918A7240C375A554CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7f9ef3ef7ae0de2fc6ad07c2cbbca63fa39b584ff3b21c34cecc0762b126b18f
                                      • Instruction ID: c7f78e3182dbad7084da03f16081e18c97fd3c83a5981d3f3acf3d9d37ba8084
                                      • Opcode Fuzzy Hash: 7f9ef3ef7ae0de2fc6ad07c2cbbca63fa39b584ff3b21c34cecc0762b126b18f
                                      • Instruction Fuzzy Hash: 3E01AD70B201151BDBA496BDD45576BB6DAEBCDB20F308839E00ECB744DD21DC824391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 873615c13078732b0f3931121ca8adf386bb682358dc3e385509c38128623195
                                      • Instruction ID: c0b9db9d6aa4cda8bd49a01164f53fdaa4ab88e919ea773444abf496ef23f961
                                      • Opcode Fuzzy Hash: 873615c13078732b0f3931121ca8adf386bb682358dc3e385509c38128623195
                                      • Instruction Fuzzy Hash: D0018C75B105194FCBA5966C989472F72DADBC9B20F30882AF90BCB744DE21DC424381
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc82556dcb40fe730365d58dbdb36be7a08e8a6e0d173b11a1b517566c49ca77
                                      • Instruction ID: 423456de0331f748e39280d339537791a4b512984d24e099cb58df6b9ab68473
                                      • Opcode Fuzzy Hash: cc82556dcb40fe730365d58dbdb36be7a08e8a6e0d173b11a1b517566c49ca77
                                      • Instruction Fuzzy Hash: 84013170B111184FDBA5EA7DE464B2E73DAE785720F708929E10ECB758EA21DC034781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c469cc955b90b240221cb667449fd080317310d9c3251b1be4a900ab86e9446d
                                      • Instruction ID: 7edbd98c53a500753de2441dcf0c04e75b58777de2b2306583678a4d3e50afda
                                      • Opcode Fuzzy Hash: c469cc955b90b240221cb667449fd080317310d9c3251b1be4a900ab86e9446d
                                      • Instruction Fuzzy Hash: FFF04632A202689FCB215E35D80499EBBBAEB84710F20043DD880DB384D7319804CBD0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8fe97f948d9f34c3916495f3da5d8eb2728ea641b4c3f105c2c7c4230c7c32e6
                                      • Instruction ID: 7d8c0aae65311c52ce9179dc71f944ab529388acf58d396f5035b91ae253dc70
                                      • Opcode Fuzzy Hash: 8fe97f948d9f34c3916495f3da5d8eb2728ea641b4c3f105c2c7c4230c7c32e6
                                      • Instruction Fuzzy Hash: ABE0DF72E1524CAFDF50CEB1D9153AA7BAEDB42204F318CA6D444CF282E176DE018391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                                      • API String ID: 0-3623093008
                                      • Opcode ID: ef6f163658b8c70da4de7594d0ee09e09178366daac9e1a328c04ddc8c0c6bcf
                                      • Instruction ID: e8bec8bf556dd32192f37922b77c2e24f0fefc48d56b550fde2a93fa8391d5b5
                                      • Opcode Fuzzy Hash: ef6f163658b8c70da4de7594d0ee09e09178366daac9e1a328c04ddc8c0c6bcf
                                      • Instruction Fuzzy Hash: AA120B70E0121A8FDB64DFA5C954AAEB7B6BF88301F308569D40AAF755DB309D85CF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq$$dq$$dq$$dq$$dq
                                      • API String ID: 0-634254105
                                      • Opcode ID: a2be235d06e044a5c2bf332170fbc2a4821e0b348d71f509abd4f3c0716e2ae6
                                      • Instruction ID: dda5cec3b135c6976ab17f6224d3898ef084a97301968885068456cf21546615
                                      • Opcode Fuzzy Hash: a2be235d06e044a5c2bf332170fbc2a4821e0b348d71f509abd4f3c0716e2ae6
                                      • Instruction Fuzzy Hash: B6918C70A0220DDFEB65DF64D954BAEBBB7BF84311F308529E8059B694DB349D41CB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .5|q$$dq$$dq$$dq$$dq$$dq$$dq
                                      • API String ID: 0-3447281907
                                      • Opcode ID: c0538d6d0d052ba9128419099c04b3faac2f61a165cebaa36deb23cc214c6949
                                      • Instruction ID: aa77deca534a45334f367ed49bf401c5f747cc8b795b10df71618a5a60d090d5
                                      • Opcode Fuzzy Hash: c0538d6d0d052ba9128419099c04b3faac2f61a165cebaa36deb23cc214c6949
                                      • Instruction Fuzzy Hash: DAF13B70A0120ECFDB55EFA8D954A6EB7B7BF88341F248529D4059F798CB31AC42CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq
                                      • API String ID: 0-185584874
                                      • Opcode ID: 1980694a6fe0c56ba97bb17f0621b701ccbbcae7807ad2262e3ef99f90543cfd
                                      • Instruction ID: af7980c95bc977dc96f834907c096947b1817d12a4514f13e6c5e64171f73d01
                                      • Opcode Fuzzy Hash: 1980694a6fe0c56ba97bb17f0621b701ccbbcae7807ad2262e3ef99f90543cfd
                                      • Instruction Fuzzy Hash: DDB12A70B112198FDB55EF68CA9466EB7B6FF84301F348829D4059B794DB34DC86DB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $dq$$dq$$dq$$dq
                                      • API String ID: 0-185584874
                                      • Opcode ID: b7f3c396ececebfd817f7818ec99df31d9e7489d51350cf0b6daf4945cbb2ef7
                                      • Instruction ID: a7efc54d9e0fadb75f3765bffb51f91f73df08ec5cd3a7e3da3aade34ae2722d
                                      • Opcode Fuzzy Hash: b7f3c396ececebfd817f7818ec99df31d9e7489d51350cf0b6daf4945cbb2ef7
                                      • Instruction Fuzzy Hash: 1C51AD34A122089FDF66DB68E9906AEB7B6EF84311F34892AD805DF654DB309D41CB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2891727001.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_6910000_AddInProcess32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LRdq$LRdq$$dq$$dq
                                      • API String ID: 0-340319088
                                      • Opcode ID: 089b245fe327ee672c6f39b51c1bde74a55e58db4bd04e96aab7083e4fa03f2c
                                      • Instruction ID: 46ae2346c95a44471b11f31a09195f26dc481f6033e2e433a510494ae525960c
                                      • Opcode Fuzzy Hash: 089b245fe327ee672c6f39b51c1bde74a55e58db4bd04e96aab7083e4fa03f2c
                                      • Instruction Fuzzy Hash: CC518030B002099FDB58EF68DA54A7A77E6FF85300F248969E4159F7A9DA30EC41CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%