Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RP0143VgD8.exe

Overview

General Information

Sample name:RP0143VgD8.exe
renamed because original name is a hash value
Original sample name:6ce756cf6ff2be0a373ed026d603ff3a.exe
Analysis ID:1431220
MD5:6ce756cf6ff2be0a373ed026d603ff3a
SHA1:ad6ed291a7893369188f7da9b93fa544f9400af4
SHA256:88c8961a315e2badff5a30985646c2349a8c115a20a892a52b0888001d2af94a
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Installs new ROOT certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops certificate files (DER)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • RP0143VgD8.exe (PID: 7032 cmdline: "C:\Users\user\Desktop\RP0143VgD8.exe" MD5: 6CE756CF6FF2BE0A373ED026D603FF3A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["103.113.70.99:2630"], "Bot Id": "spoo", "Authorization Header": "a442868c38da8722ebccd4819def00b2"}
SourceRuleDescriptionAuthorStrings
RP0143VgD8.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1213376890.0000000000412000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      Process Memory Space: RP0143VgD8.exe PID: 7032JoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.RP0143VgD8.exe.410000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: RP0143VgD8.exeMalware Configuration Extractor: RedLine {"C2 url": ["103.113.70.99:2630"], "Bot Id": "spoo", "Authorization Header": "a442868c38da8722ebccd4819def00b2"}
          Source: RP0143VgD8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: RP0143VgD8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: RP0143VgD8.exe, 00000000.00000002.2474383112.00000000063B0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2474414365.00000000063F4000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2469545697.0000000000BD1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2469545697.0000000000B51000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2474414365.00000000063F4000.00000004.00000020.00020000.00000000.sdmp

          Networking

          barindex
          Source: Malware configuration extractorURLs: 103.113.70.99:2630
          Source: global trafficTCP traffic: 192.168.2.7:49701 -> 103.113.70.99:2630
          Source: Joe Sandbox ViewIP Address: 103.113.70.99 103.113.70.99
          Source: Joe Sandbox ViewASN Name: NETCONNECTWIFI-ASNetConnectWifiPvtLtdIN NETCONNECTWIFI-ASNetConnectWifiPvtLtdIN
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9W
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Responsex
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9LR
          Source: RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Responsex
          Source: RP0143VgD8.exeString found in binary or memory: https://api.ip.sb/ip
          Source: C:\Users\user\Desktop\RP0143VgD8.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp766D.tmpJump to dropped file
          Source: C:\Users\user\Desktop\RP0143VgD8.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp769D.tmpJump to dropped file
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_025F25D80_2_025F25D8
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_025FDC740_2_025FDC74
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_060567D80_2_060567D8
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_0605A3E80_2_0605A3E8
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_0605A3D80_2_0605A3D8
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_06056FE80_2_06056FE8
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_06056FF80_2_06056FF8
          Source: RP0143VgD8.exe, 00000000.00000000.1213407087.0000000000456000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUpspearing.exe8 vs RP0143VgD8.exe
          Source: RP0143VgD8.exe, 00000000.00000002.2469545697.0000000000B1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RP0143VgD8.exe
          Source: RP0143VgD8.exeBinary or memory string: OriginalFilenameUpspearing.exe8 vs RP0143VgD8.exe
          Source: RP0143VgD8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: classification engineClassification label: mal64.troj.winEXE@1/4@0/1
          Source: C:\Users\user\Desktop\RP0143VgD8.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeMutant created: NULL
          Source: C:\Users\user\Desktop\RP0143VgD8.exeFile created: C:\Users\user~1\AppData\Local\Temp\Tmp766D.tmpJump to behavior
          Source: RP0143VgD8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: RP0143VgD8.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\RP0143VgD8.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: msvcp140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: esdsip.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: linkinfo.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
          Source: Google Chrome.lnk.0.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
          Source: C:\Users\user\Desktop\RP0143VgD8.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: RP0143VgD8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: RP0143VgD8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: RP0143VgD8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: RP0143VgD8.exe, 00000000.00000002.2474383112.00000000063B0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2474414365.00000000063F4000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2469545697.0000000000BD1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2469545697.0000000000B51000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: RP0143VgD8.exe, 00000000.00000002.2474414365.00000000063F4000.00000004.00000020.00020000.00000000.sdmp
          Source: RP0143VgD8.exeStatic PE information: 0xF0DBE6BE [Sun Jan 19 04:14:54 2098 UTC]
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_025FFA18 push edx; retf 0_2_025FFA1E
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_025FFAC1 push ebx; retf 0_2_025FFAC6
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_025FDBE1 push ecx; retf 0_2_025FDBE2
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_025FDDA2 push ebx; retf 0_2_025FDDBA
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_0605E060 push es; ret 0_2_0605E070
          Source: C:\Users\user\Desktop\RP0143VgD8.exeCode function: 0_2_0605ECF2 push eax; ret 0_2_0605ED01

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\RP0143VgD8.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeMemory allocated: 2540000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeMemory allocated: 2740000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeMemory allocated: 4740000 memory reserve | memory write watchJump to behavior
          Source: RP0143VgD8.exe, 00000000.00000002.2474414365.00000000063F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllu
          Source: C:\Users\user\Desktop\RP0143VgD8.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Users\user\Desktop\RP0143VgD8.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RP0143VgD8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: RP0143VgD8.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.RP0143VgD8.exe.410000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1213376890.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RP0143VgD8.exe PID: 7032, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: RP0143VgD8.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.RP0143VgD8.exe.410000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1213376890.0000000000412000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RP0143VgD8.exe PID: 7032, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Masquerading
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Disable or Modify Tools
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Obfuscated Files or Information
          NTDS1
          File and Directory Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Install Root Certificate
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Timestomp
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://api.ip.sb/ip0%URL Reputationsafe
          http://tempuri.org/Entity/Id22LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id20LR0%Avira URL Cloudsafe
          http://tempuri.org/0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id22Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id24LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id18Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id17LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id15LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id15Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id19LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id10Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id13LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id7LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id19Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id9LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id11LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id1LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id5LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id3LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id6Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id7Responsex0%Avira URL Cloudsafe
          103.113.70.99:26300%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id21Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id1Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id23LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id23Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id5Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id21LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id14Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id11Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id2Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id20Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id8Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id18LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id14LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id13Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id16LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id16Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id8LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id12LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id6LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id9Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id10LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id3Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id24Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id4LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id12Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id17Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id2LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id150%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id180%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id4Responsex0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          103.113.70.99:2630true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://tempuri.org/Entity/Id24LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id22LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id20LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id15ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id18ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/soap/envelope/RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://tempuri.org/RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id19LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id17LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id22ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id15LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id9LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id10ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id19ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9WRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://tempuri.org/Entity/Id13LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://tempuri.org/Entity/Id7LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://tempuri.org/Entity/Id11LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponseRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://tempuri.org/Entity/Id1LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://tempuri.org/Entity/Id5LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id3LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id6ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id7ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id1ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id21ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://api.ip.sb/ipRP0143VgD8.exefalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgementRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://tempuri.org/Entity/Id23LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id21LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id5ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://tempuri.org/Entity/Id14ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id2ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id11ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id20ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://tempuri.org/Entity/Id8ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id18LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id13ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id16ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id16LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id8LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id14LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id6LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id12LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id9ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2004/08/addressingRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://tempuri.org/Entity/Id10LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id3ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id4LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id24ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id2LRRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/rmRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessageRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://tempuri.org/Entity/Id15RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id12ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id17ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id18RP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/soap/actor/nextRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://tempuri.org/Entity/Id4ResponsexRP0143VgD8.exe, 00000000.00000002.2472880897.0000000002741000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      103.113.70.99
                                      unknownIndia
                                      133973NETCONNECTWIFI-ASNetConnectWifiPvtLtdINtrue
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1431220
                                      Start date and time:2024-04-24 17:36:07 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 35s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:15
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:RP0143VgD8.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:6ce756cf6ff2be0a373ed026d603ff3a.exe
                                      Detection:MAL
                                      Classification:mal64.troj.winEXE@1/4@0/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 69
                                      • Number of non-executed functions: 5
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: RP0143VgD8.exe
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      103.113.70.99CQPfRTSy7N.exeGet hashmaliciousRedLineBrowse
                                        G4jZEW68K1.exeGet hashmaliciousRedLineBrowse
                                          X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                            X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                              dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                  K2xdxHSWJK.exeGet hashmaliciousRedLineBrowse
                                                    XHr735qu8v.exeGet hashmaliciousRedLineBrowse
                                                      gm5v3JlTMk.exeGet hashmaliciousRedLineBrowse
                                                        o8uKhd6peZ.exeGet hashmaliciousRedLineBrowse
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          NETCONNECTWIFI-ASNetConnectWifiPvtLtdINCQPfRTSy7N.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          G4jZEW68K1.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          K2xdxHSWJK.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          XHr735qu8v.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          gm5v3JlTMk.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          o8uKhd6peZ.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\RP0143VgD8.exe
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 06:54:38 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
                                                          Category:modified
                                                          Size (bytes):2104
                                                          Entropy (8bit):3.4786757643153168
                                                          Encrypted:false
                                                          SSDEEP:48:8SjB7dvTgtX0lRYrnvPdAKRkdAGdAKRFdAKRr:8Sj7cR7
                                                          MD5:F84F45FF15441CB8FCE021BB0146FD22
                                                          SHA1:25A67670146EB7AD4183A792DC1980BE830EA74B
                                                          SHA-256:79338921C2315367BC6E581DD6DC6C6102C20189A679AEC8C9A5FC95A80C5009
                                                          SHA-512:21392FFCE05FF358EEA6192F40F4812303A15B752E7D81A88E69DF302DF80B12C34D760C52EC20C54D7AA3E66E8DE9CE2D7017E09E09F2E23662A2A233E03939
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:L..................F.@.. ......,.....5.0a....X.&&... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....EW.=..PROGRA~1..t......O.IEW.>....B...............J.......z.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEW.8....L.....................p+j.G.o.o.g.l.e.....T.1.....EW.8..Chrome..>......CW.VEW.8....M.....................>.i.C.h.r.o.m.e.....`.1.....EW.8..APPLIC~1..H......CW.VEW.8..........................>.i.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.L .chrome.exe..F......CW.VEW.>..........................l...c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                                          Process:C:\Users\user\Desktop\RP0143VgD8.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2662
                                                          Entropy (8bit):7.8230547059446645
                                                          Encrypted:false
                                                          SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                          MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                          SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                          SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                          SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                          Process:C:\Users\user\Desktop\RP0143VgD8.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2662
                                                          Entropy (8bit):7.8230547059446645
                                                          Encrypted:false
                                                          SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                          MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                          SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                          SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                          SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                          Process:C:\Users\user\Desktop\RP0143VgD8.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2251
                                                          Entropy (8bit):7.627318790109149
                                                          Encrypted:false
                                                          SSDEEP:48:S7SjQDUb4fdVfWlYTZRONhiFEYa5o8Kip2ODkRbKKdVCj:ASUDw4fdVeYTZlFEYa53Ke8BVCj
                                                          MD5:89E60D5E60EA6C6E452711A4D39B1E7C
                                                          SHA1:061258252F24709588A4EDFE22710C5418A9E104
                                                          SHA-256:9EEEDD434727C0AEAD109DC6CEFB269645CFBF0D8E7018C4D4F405E79AEE0D03
                                                          SHA-512:6974A68F47E2F356A96B94CEB5E4F944DECCEC6CB96630FBB201779F41C4E62ED8C98FA667DC5BB03E40CE51003E595C25BDA604BF1FDE0BAF74741E721D7FF2
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:........'...............P...............{41744BE4-11C5-494C-A213-BA0CE944938E}.....................RSA1..................v..XU~l2_.......vj....b.... ..&...X.Y...=q...).....`.1.0..~......5DL. ..S>.......<..y...*?YOA.... eb.QD..B..<.!..'J..+.'...4fu.z./....]@.y.b...o...).j'......0}B.*j..R..-..2.....'=...@....s....;. .v=..;...\$...G....2S....al.ZQ.Q...w...aXzW.....................z..O.........?q.D..I.46.f....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... .......|...5..1....eYI....)................ ..........L.&k..dV...Uh...!E.V...P...t...q;+o.@4Q........~..`.../..Z..$...z.4ul:rg:Xi/....X...$.K....Cy_P..l..aV.;.....7.......& .T.L...r.;Q..5f...gEay1./>...G.M.c.&....en...[p..$,....U...=.....Q....1$]Q...Q..}.6'...s2..%.<P..I....9..%i.%6..n).e.V.........gw..V.G!rV.R...I..+......du...<.\.."|BC=..I.+...W...%%.'...3...G....2.!..~.........@..6..{..YV`.VonWq....%J0V.f.BI..)...U.Z.........0H.y..?zj....m/..u..f.U..%.=.f.E....su.h....G.j..=...X..
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):5.045974226197736
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          File name:RP0143VgD8.exe
                                                          File size:314'234 bytes
                                                          MD5:6ce756cf6ff2be0a373ed026d603ff3a
                                                          SHA1:ad6ed291a7893369188f7da9b93fa544f9400af4
                                                          SHA256:88c8961a315e2badff5a30985646c2349a8c115a20a892a52b0888001d2af94a
                                                          SHA512:6e26ce009b41f1945b2973781d257ca17d78460dda8bc8a0e0c51a202cf0fdeeb1f5ca3c3a3ec8fae4e035c8155d9968f64a73f6392f169a4a9d563114037b49
                                                          SSDEEP:6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
                                                          TLSH:4C645C1823EC8911E27F4B7994A1E274D375ED56A452E30F4ED06CAB3E32741FA11AB2
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ... ....@.. ....................... ............@................................
                                                          Icon Hash:4d8ea38d85a38e6d
                                                          Entrypoint:0x42b9ae
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0xF0DBE6BE [Sun Jan 19 04:14:54 2098 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          popad
                                                          add byte ptr [ebp+00h], dh
                                                          je 00007FDC98BC6352h
                                                          outsd
                                                          add byte ptr [esi+00h], ah
                                                          imul eax, dword ptr [eax], 006C006Ch
                                                          xor eax, 59007400h
                                                          add byte ptr [edi+00h], dl
                                                          push edx
                                                          add byte ptr [ecx+00h], dh
                                                          popad
                                                          add byte ptr [edi+00h], dl
                                                          push esi
                                                          add byte ptr [edi+00h], ch
                                                          popad
                                                          add byte ptr [ebp+00h], ch
                                                          push 61006800h
                                                          add byte ptr [ebp+00h], ch
                                                          dec edx
                                                          add byte ptr [eax], bh
                                                          add byte ptr [edi+00h], dl
                                                          push edi
                                                          add byte ptr [ecx], bh
                                                          add byte ptr [ecx+00h], bh
                                                          bound eax, dword ptr [eax]
                                                          xor al, byte ptr [eax]
                                                          insb
                                                          add byte ptr [eax+00h], bl
                                                          pop ecx
                                                          add byte ptr [edi+00h], dl
                                                          js 00007FDC98BC6352h
                                                          jnc 00007FDC98BC6352h
                                                          pop edx
                                                          add byte ptr [eax+00h], bl
                                                          push ecx
                                                          add byte ptr [ebx+00h], cl
                                                          popad
                                                          add byte ptr [edi+00h], dl
                                                          dec edx
                                                          add byte ptr [ebp+00h], dh
                                                          pop edx
                                                          add byte ptr [edi+00h], dl
                                                          jo 00007FDC98BC6352h
                                                          imul eax, dword ptr [eax], 5Ah
                                                          add byte ptr [ebp+00h], ch
                                                          jo 00007FDC98BC6352h
                                                          je 00007FDC98BC6352h
                                                          bound eax, dword ptr [eax]
                                                          push edi
                                                          add byte ptr [eax+eax+77h], dh
                                                          add byte ptr [ecx+00h], bl
                                                          xor al, byte ptr [eax]
                                                          xor eax, 63007300h
                                                          add byte ptr [edi+00h], al
                                                          push esi
                                                          add byte ptr [ecx+00h], ch
                                                          popad
                                                          add byte ptr [edx], dh
                                                          add byte ptr [eax+00h], bh
                                                          je 00007FDC98BC6352h
                                                          bound eax, dword ptr [eax]
                                                          insd
                                                          add byte ptr [eax+eax+76h], dh
                                                          add byte ptr [edx+00h], bl
                                                          push edi
                                                          add byte ptr [ecx], bh
                                                          add byte ptr [eax+00h], dh
                                                          popad
                                                          add byte ptr [edi+00h], al
                                                          cmp dword ptr [eax], eax
                                                          insd
                                                          add byte ptr [edx+00h], bl
                                                          push edi
                                                          add byte ptr [esi+00h], cl
                                                          cmp byte ptr [eax], al
                                                          push esi
                                                          add byte ptr [eax+00h], cl
                                                          dec edx
                                                          add byte ptr [esi+00h], dh
                                                          bound eax, dword ptr [eax]
                                                          insd
                                                          add byte ptr [eax+00h], bh
                                                          jo 00007FDC98BC6352h
                                                          bound eax, dword ptr [eax]
                                                          insd
                                                          add byte ptr [ebx+00h], dh
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2b95c0x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x1c9d4.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x2b9400x1c.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x2e9940x2ec0064c48738b5efa1379746874c338807d5False0.4696168950534759data6.205450376900145IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x320000x1c9d40x1cc005b3e8f48de8a05507379330b3cf331a7False0.23725373641304348data2.6063301335912525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x500000xc0x400f921873e0b7f3fe3399366376917ef43False0.025390625data0.05390218305374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x321a00x3d04PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9934058898847631
                                                          RT_ICON0x35eb40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.09013072282030049
                                                          RT_ICON0x466ec0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.13905290505432216
                                                          RT_ICON0x4a9240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.17033195020746889
                                                          RT_ICON0x4cedc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.2045028142589118
                                                          RT_ICON0x4df940x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24645390070921985
                                                          RT_GROUP_ICON0x4e40c0x5adata0.7666666666666667
                                                          RT_VERSION0x4e4780x35adata0.4417249417249417
                                                          RT_MANIFEST0x4e7e40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 24, 2024 17:37:00.567507982 CEST497012630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:01.566323042 CEST497012630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:03.566246033 CEST497012630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:07.566257954 CEST497012630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:15.581918955 CEST497012630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:26.631547928 CEST497072630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:27.644675016 CEST497072630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:29.644723892 CEST497072630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:33.644735098 CEST497072630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:41.644526958 CEST497072630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:52.661772013 CEST497082630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:53.660219908 CEST497082630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:55.675905943 CEST497082630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:37:59.691520929 CEST497082630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:07.691581964 CEST497082630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:18.711030960 CEST497102630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:19.722934961 CEST497102630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:21.722909927 CEST497102630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:25.738426924 CEST497102630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:33.754101038 CEST497102630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:44.787336111 CEST497112630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:45.801053047 CEST497112630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:47.801031113 CEST497112630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:51.816701889 CEST497112630192.168.2.7103.113.70.99
                                                          Apr 24, 2024 17:38:59.816704035 CEST497112630192.168.2.7103.113.70.99

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Target ID:0
                                                          Start time:17:36:58
                                                          Start date:24/04/2024
                                                          Path:C:\Users\user\Desktop\RP0143VgD8.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\RP0143VgD8.exe"
                                                          Imagebase:0x410000
                                                          File size:314'234 bytes
                                                          MD5 hash:6CE756CF6FF2BE0A373ED026D603FF3A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1213376890.0000000000412000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:6.7%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:53
                                                            Total number of Limit Nodes:2
                                                            execution_graph 24960 25fad38 24964 25fae30 24960->24964 24971 25fae20 24960->24971 24961 25fad47 24965 25fae41 24964->24965 24968 25fae5c 24964->24968 24978 25f9838 24965->24978 24968->24961 24972 25fae41 24971->24972 24975 25fae5c 24971->24975 24973 25f9838 GetModuleHandleW 24972->24973 24974 25fae4c 24973->24974 24974->24975 24976 25fb0c8 2 API calls 24974->24976 24977 25fb0b8 2 API calls 24974->24977 24975->24961 24976->24975 24977->24975 24980 25fb020 GetModuleHandleW 24978->24980 24981 25fae4c 24980->24981 24981->24968 24982 25fb0b8 24981->24982 24987 25fb0c8 24981->24987 24983 25f9838 GetModuleHandleW 24982->24983 24984 25fb0dc 24982->24984 24983->24984 24985 25fb101 24984->24985 24992 25fa870 24984->24992 24985->24968 24988 25f9838 GetModuleHandleW 24987->24988 24989 25fb0dc 24988->24989 24990 25fb101 24989->24990 24991 25fa870 LoadLibraryExW 24989->24991 24990->24968 24991->24990 24993 25fb2a8 LoadLibraryExW 24992->24993 24995 25fb321 24993->24995 24995->24985 24996 25fd0b8 24997 25fd0fe 24996->24997 25001 25fd289 24997->25001 25004 25fd298 24997->25004 24998 25fd1eb 25002 25fd2c6 25001->25002 25007 25fc9a0 25001->25007 25002->24998 25005 25fc9a0 DuplicateHandle 25004->25005 25006 25fd2c6 25005->25006 25006->24998 25008 25fd300 DuplicateHandle 25007->25008 25009 25fd396 25008->25009 25009->25002 25010 25f4668 25011 25f4684 25010->25011 25012 25f4696 25011->25012 25014 25f47a0 25011->25014 25015 25f47c5 25014->25015 25019 25f48a1 25015->25019 25023 25f48b0 25015->25023 25021 25f48d7 25019->25021 25020 25f49b4 25020->25020 25021->25020 25027 25f4248 25021->25027 25025 25f48d7 25023->25025 25024 25f49b4 25025->25024 25026 25f4248 CreateActCtxA 25025->25026 25026->25024 25028 25f5940 CreateActCtxA 25027->25028 25030 25f5a03 25028->25030
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 156a28186784ab0d43406bcbdd18be250308594be38550a4bc1784f73eb0c75b
                                                            • Instruction ID: 1e2f8a41696aa00e77c9adf9a19fab1a6f27aeab25fc9507b43ad38e086ec809
                                                            • Opcode Fuzzy Hash: 156a28186784ab0d43406bcbdd18be250308594be38550a4bc1784f73eb0c75b
                                                            • Instruction Fuzzy Hash: 6AF1B234A102099FDB55DF68D880BAEBFF2EF84300F558569E805DB2A1DB35ED46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 87889c8ab445031ac1ce8b013f83cab9d0c2f9ad51fc67042346a37a5ba4dda9
                                                            • Instruction ID: fce5bc019daa95339cfbbdc9182546fcf33fb82bfc511e86339f8131d6688c0f
                                                            • Opcode Fuzzy Hash: 87889c8ab445031ac1ce8b013f83cab9d0c2f9ad51fc67042346a37a5ba4dda9
                                                            • Instruction Fuzzy Hash: DDD1F474900308CFCB58EFB4D854AADBBB2FF8A312F1081A9D50AAB354DB359985CF11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3342e0cbdd532e3eb026c98edec2fdb10cbec629189ea6f9dd27d077d7735368
                                                            • Instruction ID: e0cc2bb61d8bec8692bd9aa900f60a7b12daf11c5fc3ae063dbc76f0479260d2
                                                            • Opcode Fuzzy Hash: 3342e0cbdd532e3eb026c98edec2fdb10cbec629189ea6f9dd27d077d7735368
                                                            • Instruction Fuzzy Hash: 5FD1E474A00318CFCB58EFB4D85469DBBB2FF8A312F108569D50AAB394DB359985CF11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 326 6053f50-6053f84 329 6053f86-6053f8f 326->329 330 6053f92-6053fa5 326->330 329->330 331 6054215-6054219 330->331 332 6053fab-6053fae 330->332 334 605422e-6054238 331->334 335 605421b-605422b 331->335 336 6053fb0-6053fb5 332->336 337 6053fbd-6053fc9 332->337 335->334 336->337 338 6054253-6054299 337->338 339 6053fcf-6053fe1 337->339 346 60542a8-60542d0 338->346 347 605429b-60542a5 338->347 343 6053fe7-605403a 339->343 344 605414d-605415b 339->344 376 605403c-6054048 call 6053c88 343->376 377 605404a 343->377 351 6054161-605416f 344->351 352 60541e0-60541e2 344->352 368 6054425-6054443 346->368 369 60542d6-60542ef 346->369 347->346 354 6054171-6054176 351->354 355 605417e-605418a 351->355 356 60541e4-60541ea 352->356 357 60541f0-60541fc 352->357 354->355 355->338 362 6054190-60541bf 355->362 360 60541ec 356->360 361 60541ee 356->361 367 60541fe-605420f 357->367 360->357 361->357 381 60541c1-60541ce 362->381 382 60541d0-60541de 362->382 367->331 367->332 385 6054445-6054467 368->385 386 60544ae-60544b8 368->386 387 60542f5-605430b 369->387 388 6054406-605441f 369->388 378 605404c-605405c 376->378 377->378 393 6054077-6054079 378->393 394 605405e-6054075 378->394 381->382 382->331 407 60544b9-605450a 385->407 408 6054469-6054485 385->408 387->388 405 6054311-605435f 387->405 388->368 388->369 397 60540c2-60540c4 393->397 398 605407b-6054089 393->398 394->393 401 60540c6-60540d0 397->401 402 60540d2-60540e2 397->402 398->397 412 605408b-605409d 398->412 401->402 415 605411b-6054127 401->415 416 60540e4-60540f2 402->416 417 605410d-6054113 call 60548a8 402->417 454 6054361-6054387 405->454 455 6054389-60543ad 405->455 443 605450c-6054528 407->443 444 605452a-6054568 407->444 421 60544a9-60544ac 408->421 423 60540a3-60540a7 412->423 424 605409f-60540a1 412->424 415->367 433 605412d-6054148 415->433 429 6054105-6054108 416->429 430 60540f4-6054103 416->430 427 6054119 417->427 421->386 425 6054493-6054496 421->425 431 60540ad-60540bc 423->431 424->431 425->407 432 6054498-60544a8 425->432 427->415 429->331 430->415 431->397 441 6054239-605424c 431->441 432->421 433->331 441->338 443->444 454->455 464 60543df-60543f8 455->464 465 60543af-60543c6 455->465 467 6054403-6054404 464->467 468 60543fa 464->468 472 60543d2-60543dd 465->472 473 60543c8-60543cb 465->473 467->388 468->467 472->464 472->465 473->472
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q
                                                            • API String ID: 0-1301096350
                                                            • Opcode ID: edac2ecebe613b213cf919b31ace87e164f26b312d8926c4d828987768f8316a
                                                            • Instruction ID: 52b25a69794bdf60d5475c22b63af204aebb0d85970e893e03c8b5cb32e92313
                                                            • Opcode Fuzzy Hash: edac2ecebe613b213cf919b31ace87e164f26b312d8926c4d828987768f8316a
                                                            • Instruction Fuzzy Hash: 75E16F34F402158FDB54DF69D984AAEBBF6BF88700B158169E905EB365DB30DC42CBA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 476 25f5935-25f5a01 CreateActCtxA 478 25f5a0a-25f5a64 476->478 479 25f5a03-25f5a09 476->479 486 25f5a66-25f5a69 478->486 487 25f5a73-25f5a77 478->487 479->478 486->487 488 25f5a79-25f5a85 487->488 489 25f5a88 487->489 488->489 491 25f5a89 489->491 491->491
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 025F59F1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 396fbae345b972fd43e38a804d055a7d8d2f1d6c8ba8d149bb259ab4c059fd3d
                                                            • Instruction ID: 0166ee01888d09d8bc0a4a491540ff1f37454cc9610ca63a080d1a35dd2aa3a0
                                                            • Opcode Fuzzy Hash: 396fbae345b972fd43e38a804d055a7d8d2f1d6c8ba8d149bb259ab4c059fd3d
                                                            • Instruction Fuzzy Hash: 6241E571D00729CBEB24DFA9C88478DBBF5FF48304F20816AD508AB251DB75694ACF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 492 25f4248-25f5a01 CreateActCtxA 495 25f5a0a-25f5a64 492->495 496 25f5a03-25f5a09 492->496 503 25f5a66-25f5a69 495->503 504 25f5a73-25f5a77 495->504 496->495 503->504 505 25f5a79-25f5a85 504->505 506 25f5a88 504->506 505->506 508 25f5a89 506->508 508->508
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 025F59F1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 5f3423aaa4cd232fa60130788cd4dcd091371ce07250f2349b59b9101cc3d20c
                                                            • Instruction ID: fdd1cd215670605e0f92f51ddc43441c334b5278fa8b2cce1802f4201af72d78
                                                            • Opcode Fuzzy Hash: 5f3423aaa4cd232fa60130788cd4dcd091371ce07250f2349b59b9101cc3d20c
                                                            • Instruction Fuzzy Hash: 3C41E370D00729CBEB24DFA9C84478DBBF5FF48314F10806AD508AB251EB75694ACF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 509 25fc9a0-25fd394 DuplicateHandle 511 25fd39d-25fd3ba 509->511 512 25fd396-25fd39c 509->512 512->511
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,025FD2C6,?,?,?,?,?), ref: 025FD387
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 6f79d131bbedf6433a5fd12f543fc94056a0ab77ea845205b7cba2cfd79c11aa
                                                            • Instruction ID: 4bc1280db6240bf5c26fa3a680bb97e8647538fb9e5e7e09938e62f9469ec27a
                                                            • Opcode Fuzzy Hash: 6f79d131bbedf6433a5fd12f543fc94056a0ab77ea845205b7cba2cfd79c11aa
                                                            • Instruction Fuzzy Hash: D42105B5D003089FDB10DF9AD984ADEBBF5FB48310F10801AEA14A3350D374A940CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 515 25fd2ff-25fd394 DuplicateHandle 516 25fd39d-25fd3ba 515->516 517 25fd396-25fd39c 515->517 517->516
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,025FD2C6,?,?,?,?,?), ref: 025FD387
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: a71f54474608d6dfb04eedc042cb815d33f87bd2fe82f609e0d1480a9289e324
                                                            • Instruction ID: 306492816486e1deb24a5c67b548c2b41faba78a6b6bda6b0b98764e8a273587
                                                            • Opcode Fuzzy Hash: a71f54474608d6dfb04eedc042cb815d33f87bd2fe82f609e0d1480a9289e324
                                                            • Instruction Fuzzy Hash: 5C21E2B5D012089FDB10DFAAD984ADEBFF5FB48320F14801AE918A3350D378A945CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 520 25fa870-25fb2e8 522 25fb2ea-25fb2ed 520->522 523 25fb2f0-25fb31f LoadLibraryExW 520->523 522->523 524 25fb328-25fb345 523->524 525 25fb321-25fb327 523->525 525->524
                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,025FB101,00000800,00000000,00000000), ref: 025FB312
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 3beee6365585148a61503bff800c6f87c1a8196ebc3ae34a95938e7c46af2c2d
                                                            • Instruction ID: 442580ea771d4a2b9ec4286e33320fed61eb93bea8495a7f800884fda1cecd54
                                                            • Opcode Fuzzy Hash: 3beee6365585148a61503bff800c6f87c1a8196ebc3ae34a95938e7c46af2c2d
                                                            • Instruction Fuzzy Hash: 0911D3B6D00349DFDB20DF9AC844A9EFBF5EB48314F10842AD919A7240C775A945CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 528 25fb2a7-25fb2e8 529 25fb2ea-25fb2ed 528->529 530 25fb2f0-25fb31f LoadLibraryExW 528->530 529->530 531 25fb328-25fb345 530->531 532 25fb321-25fb327 530->532 532->531
                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,025FB101,00000800,00000000,00000000), ref: 025FB312
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 9b76abe28e4e271ee5520f854d40e49faf6aa4b58bc84d8f57d3c5423b060fea
                                                            • Instruction ID: 82ae470c66c527837ccf2d2ccf50ed4c317ac4b4efc3086bff84a36933533f3a
                                                            • Opcode Fuzzy Hash: 9b76abe28e4e271ee5520f854d40e49faf6aa4b58bc84d8f57d3c5423b060fea
                                                            • Instruction Fuzzy Hash: 9211E2B6D003498FDB20DF9AD844ADEFBF5EB48314F10842AD919A7240C775A545CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 535 25f9838-25fb060 537 25fb068-25fb093 GetModuleHandleW 535->537 538 25fb062-25fb065 535->538 539 25fb09c-25fb0b0 537->539 540 25fb095-25fb09b 537->540 538->537 540->539
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,025FAE4C), ref: 025FB086
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 402df81c09929a11c725bbaeb14e8b5386dd42f638242279556b4e4bddb44bab
                                                            • Instruction ID: 2bdd27139ba5b6905183ef8c0c85d60126f841f7ee275d30da0b21202ac2ad8a
                                                            • Opcode Fuzzy Hash: 402df81c09929a11c725bbaeb14e8b5386dd42f638242279556b4e4bddb44bab
                                                            • Instruction Fuzzy Hash: E01120B5C00309DBDB20DF9AC444BAEFBF9FB48218F10842AD528B7600D375A909CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 542 25fb01f-25fb060 543 25fb068-25fb093 GetModuleHandleW 542->543 544 25fb062-25fb065 542->544 545 25fb09c-25fb0b0 543->545 546 25fb095-25fb09b 543->546 544->543 546->545
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,025FAE4C), ref: 025FB086
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 6f1e807417561a66a600d5eac138e1fb7f03d79a6e0e99e846756323645ea6cd
                                                            • Instruction ID: 99aa7b51820a0dc3bea829389132fe3180815f7b2e25ac6b4faa0e0e0b1d68ff
                                                            • Opcode Fuzzy Hash: 6f1e807417561a66a600d5eac138e1fb7f03d79a6e0e99e846756323645ea6cd
                                                            • Instruction Fuzzy Hash: CC11CDB5C00349CBDB20DF9AD444ADEFBF5FB88224F10842AD529A7610D379A546CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 548 60559c8-60559c9 549 60559c4-60559c7 548->549 550 60559cb-60559f3 548->550 551 60559f5-60559f7 550->551 552 60559ff-6055a0e 550->552 551->552 553 6055a10 552->553 554 6055a1a-6055a2a 552->554 553->554 555 6055a2d-6055a4f 554->555 556 6055a55-6055a5b 555->556 557 6055c88-6055ccf 555->557 558 6055b34-6055b38 556->558 559 6055a61-6055a67 556->559 587 6055ce5-6055cf1 557->587 588 6055cd1 557->588 562 6055b5b-6055b64 558->562 563 6055b3a-6055b43 558->563 559->557 561 6055a6d-6055a7a 559->561 566 6055a80-6055a89 561->566 567 6055b13-6055b1c 561->567 564 6055b66-6055b86 562->564 565 6055b89-6055b8c 562->565 563->557 568 6055b49-6055b59 563->568 564->565 569 6055b8f-6055b95 565->569 566->557 572 6055a8f-6055ab0 566->572 567->557 571 6055b22-6055b2e 567->571 568->569 569->557 574 6055b9b-6055bae 569->574 571->558 571->559 575 6055ab2 572->575 576 6055abc-6055ad7 572->576 574->557 577 6055bb4-6055bc4 574->577 575->576 576->567 582 6055ad9-6055adf 576->582 577->557 581 6055bca-6055bd7 577->581 581->557 583 6055bdd-6055c02 581->583 585 6055ae1 582->585 586 6055aeb-6055af1 582->586 583->557 598 6055c08-6055c20 583->598 585->586 586->557 591 6055af7-6055b10 586->591 589 6055cf3 587->589 590 6055cfd-6055d19 587->590 593 6055cd4-6055ce3 588->593 589->590 593->587 598->557 601 6055c22-6055c2d 598->601 602 6055c2f-6055c39 601->602 603 6055c7e-6055c85 601->603 602->603 605 6055c3b-6055c51 602->605 607 6055c53 605->607 608 6055c5d-6055c76 605->608 607->608 608->603
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: d
                                                            • API String ID: 0-2564639436
                                                            • Opcode ID: 1e476e1e8434740f65735f031e172d97b4f49bf001178727a227ac819aa78a1f
                                                            • Instruction ID: cd767494aa7151ac487c1f0bd63a41b55eac1eeb7c78d1305bafb54613f08121
                                                            • Opcode Fuzzy Hash: 1e476e1e8434740f65735f031e172d97b4f49bf001178727a227ac819aa78a1f
                                                            • Instruction Fuzzy Hash: 8FC15C35600A06CFCB65CF18C88096ABBF2FF89310B56CA59D95A9B765D730FC46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 611 6057d10-6057dc3 613 6057dc5-6057dd0 611->613 614 6057e0d-6057e0f 611->614 613->614 615 6057dd2-6057dde 613->615 616 6057e11 614->616 617 6057e01-6057e0b 615->617 618 6057de0-6057dea 615->618 619 6057e16-6057e30 616->619 617->616 620 6057dec 618->620 621 6057dee-6057dfd 618->621 623 6057e38-6057e5d 619->623 620->621 621->621 622 6057dff 621->622 622->617 624 6057e62-6057e70 623->624 625 6057e72-6057e78 624->625 626 6057e79-6057e84 624->626 625->626 627 6057e86-6057e94 626->627 628 6057eb3-6057ec8 626->628 631 6057e9b-6057ed9 627->631 634 6057f0e-6057f1e 628->634 635 6057ee3-6057ee7 631->635 636 6057edb 631->636 639 6057f25-6057f2c 634->639 640 6057f20 634->640 637 6057ef7-6057efb 635->637 638 6057ee9-6057eed 635->638 636->635 642 6057efd-6057f01 637->642 643 6057f0b-6057f0c 637->643 638->637 641 6057eef 638->641 640->639 641->637 642->643 644 6057f03 642->644 643->634 644->643
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $
                                                            • API String ID: 0-3993045852
                                                            • Opcode ID: 8bb142b44dffff911de693f3fba2f0b565eed5673e8d0abc0442efa09056cc6b
                                                            • Instruction ID: 9940059795df5896fcb279834c2907b21350709920b5c096d9296808cca41aa2
                                                            • Opcode Fuzzy Hash: 8bb142b44dffff911de693f3fba2f0b565eed5673e8d0abc0442efa09056cc6b
                                                            • Instruction Fuzzy Hash: D85168B0E003588FDB55CFA9C885BDEBFF5AF48304F14852AD814AB295EB749846CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 646 6053de0-6053deb 647 6053e10-6053e48 646->647 648 6053ded-6053dfe 646->648 657 6053ea4-6053eab 647->657 658 6053e4a-6053e50 647->658 651 6053e00-6053e05 648->651 652 6053e0c-6053e0f 648->652 651->652 660 6053eac-6053eb4 657->660 659 6053e52-6053e71 658->659 658->660
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q
                                                            • API String ID: 0-1807707664
                                                            • Opcode ID: 36ff051a449d96cf8121184aa9d8f330b30f64c3ed66482bbe71fbc2a1d289a2
                                                            • Instruction ID: 16ffa6135cedd21a70bca70c6c21ae73664aabf149d118766f48343e9033bd67
                                                            • Opcode Fuzzy Hash: 36ff051a449d96cf8121184aa9d8f330b30f64c3ed66482bbe71fbc2a1d289a2
                                                            • Instruction Fuzzy Hash: 7531F336B002114FD729A738A4556AE77EADFC9211715847EE449CB380DE34EC0787E1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 663 60584c8-6058526 669 605852c-605855f 663->669 670 60585f9-6058609 663->670 669->670 676 6058565-60585bd 669->676 685 60585c5-60585f6 676->685
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q
                                                            • API String ID: 0-1807707664
                                                            • Opcode ID: ea62a887c8fbcc5ea02585c04a1c732ae1fc6a15fd2a20423007b352ab1c33b0
                                                            • Instruction ID: af47fbd5d3e44f1c7f4f4648a793e85b6f39cf78a4de9f2dcbe3b75dc5361dc5
                                                            • Opcode Fuzzy Hash: ea62a887c8fbcc5ea02585c04a1c732ae1fc6a15fd2a20423007b352ab1c33b0
                                                            • Instruction Fuzzy Hash: F931AF71B003158FDB09AB78A45467E7BE3AFC82057548479E60ACB385EF78CD0287E2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q
                                                            • API String ID: 0-1807707664
                                                            • Opcode ID: 4b90bbebcf3cd57019de560a3a16c1495405fa4eb87d8b7352cf4a33230f471a
                                                            • Instruction ID: 211f9789447f4bdc6d10277f56672a941c9168748a99a04d41ae659af96e904b
                                                            • Opcode Fuzzy Hash: 4b90bbebcf3cd57019de560a3a16c1495405fa4eb87d8b7352cf4a33230f471a
                                                            • Instruction Fuzzy Hash: C301F5389063849FCF15FB74F85485E3F76EB42305B048699E4058B70ADB346E09CB92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q
                                                            • API String ID: 0-1807707664
                                                            • Opcode ID: 9c4efdf05cc70a4540d2066b23d7a4f81d3b7e04d55c37a2cbceee9adcc07de9
                                                            • Instruction ID: 9360c7154e5af982f148782b0b8419d84532d5d8fc2dfe2f152ec799fbddcaef
                                                            • Opcode Fuzzy Hash: 9c4efdf05cc70a4540d2066b23d7a4f81d3b7e04d55c37a2cbceee9adcc07de9
                                                            • Instruction Fuzzy Hash: 4701DE34902248AFCB04EBB8E89498D7FB9EF45200B184199E405DB245DB306F48CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q
                                                            • API String ID: 0-1807707664
                                                            • Opcode ID: 5c92d6094e9a0dfc80ec114223cf5fe207b401c7aaab34f875a5fc18a17f715f
                                                            • Instruction ID: 01e19c798696895b047d21b48fc81d17b44af3a17a6c3768f832c70e863044ed
                                                            • Opcode Fuzzy Hash: 5c92d6094e9a0dfc80ec114223cf5fe207b401c7aaab34f875a5fc18a17f715f
                                                            • Instruction Fuzzy Hash: DCF096357002015FD618EB69E49496E77EBDBC92113148529E40A9B344DF20FD0783F2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q
                                                            • API String ID: 0-1807707664
                                                            • Opcode ID: 1f041b8fb1f912e8b5d43c2bdf6297377c4bde0aa2be127af7a896bdd0e8d7a5
                                                            • Instruction ID: 197f042ce412aa353cdc31b8b1e48b45c86223224703b6f937cdfe4a6a971ce8
                                                            • Opcode Fuzzy Hash: 1f041b8fb1f912e8b5d43c2bdf6297377c4bde0aa2be127af7a896bdd0e8d7a5
                                                            • Instruction Fuzzy Hash: 85F06974A01208AFCB08EFB8E58595CBBB2FF44201B1881A9D806DB349EB306E08DB51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f59845b506ca83fbb41878833d720fb1e25fd8d5ddf24948196986e69af0a5a2
                                                            • Instruction ID: 26037d41448188e6a0a1edba1ed2d729deac6406e6a91b19b5faabbe6e3c990b
                                                            • Opcode Fuzzy Hash: f59845b506ca83fbb41878833d720fb1e25fd8d5ddf24948196986e69af0a5a2
                                                            • Instruction Fuzzy Hash: 08125F34B406058FDB94DF39C584AAABBF6FF89301B1684A9E906CB365DB34EC45CB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cf7da0d54aad9e8bfd75f771af5dc41d5494c7b5a134f29356993aabfa8bdc46
                                                            • Instruction ID: 91169e7f7e01b884a94206012becbaa9393e6103c159b4ec289d11fc5c39619a
                                                            • Opcode Fuzzy Hash: cf7da0d54aad9e8bfd75f771af5dc41d5494c7b5a134f29356993aabfa8bdc46
                                                            • Instruction Fuzzy Hash: 8E513770E40318CFDB64DFA9C844BDEBBF6AF88300F158529D815AB244EB749846CF80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3aa49426d1f054e0a63a334284b6d7123a114541942efe3c482429192a1591a7
                                                            • Instruction ID: 1f0480be38973e2c55747e8768bce9277f2d378bff69efbc2b3464f6601b02ca
                                                            • Opcode Fuzzy Hash: 3aa49426d1f054e0a63a334284b6d7123a114541942efe3c482429192a1591a7
                                                            • Instruction Fuzzy Hash: AB318939B00214AFCB55EF34D884AAEBFB6FF89241B408469E905CB355DB34ED06CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 59d0ece2d593053dfb06b26c58fef1812d2ee9b2bb6c3dabf39f078ffd65ab25
                                                            • Instruction ID: 96bb3dae70e3482c99640ecfe8575de0f342725043082e7798a3a00e3fcde062
                                                            • Opcode Fuzzy Hash: 59d0ece2d593053dfb06b26c58fef1812d2ee9b2bb6c3dabf39f078ffd65ab25
                                                            • Instruction Fuzzy Hash: A2317834B00214AFCB55EF34D884AAEBFB2FF89241B408469E905CB355DB34ED06CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 26fa93cc34571359334eb844fb39faa915493e128ece4f1d410713f3fba0d96b
                                                            • Instruction ID: f133b30a9b7838f33e951699703252bfee0b2664341e38d374b965284ab14e2b
                                                            • Opcode Fuzzy Hash: 26fa93cc34571359334eb844fb39faa915493e128ece4f1d410713f3fba0d96b
                                                            • Instruction Fuzzy Hash: 0B410271D012589FDB54DFAAD840AEEFFF6EF88310F10802AD815A7250DB74A945CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aeea86e3a7f2a9e13346eb9748cbf470ecc9690087e15cdc52f468ac1232e537
                                                            • Instruction ID: 4029caf1cef6ddacc20737f072ce05922beb455f0035ba04840aaab4ad3a060b
                                                            • Opcode Fuzzy Hash: aeea86e3a7f2a9e13346eb9748cbf470ecc9690087e15cdc52f468ac1232e537
                                                            • Instruction Fuzzy Hash: B13112B1D002589FDB58DFAAC985BEEBFF6AF48300F14802AD815A7290DB749945CF51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ee2eaccff04119a9445f81ed375bc696ee31e7a92b2d735e28daa9e79141ec7
                                                            • Instruction ID: dc5fe982526ab2b652b5b76fb397df51180e75f930e59eb7c5dc404103bec262
                                                            • Opcode Fuzzy Hash: 0ee2eaccff04119a9445f81ed375bc696ee31e7a92b2d735e28daa9e79141ec7
                                                            • Instruction Fuzzy Hash: 803105B1D012589FDB54DFA9D854BDEBBF9AF48310F14802AE805A7240D774A845CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472077046.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d3d000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4d3023b440c0ebf6b705f344a581c066f18392b9bc3d892d765118ab18d4a9a3
                                                            • Instruction ID: ce7cc1afbc4dc8658b7f62a06b0ed7db7de1d5cb3b348072ed8b0d34f5de6784
                                                            • Opcode Fuzzy Hash: 4d3023b440c0ebf6b705f344a581c066f18392b9bc3d892d765118ab18d4a9a3
                                                            • Instruction Fuzzy Hash: 08212572604204DFDB15DF10E9C0B16BB66FB98324F24C169E8490F256C336E856CFB2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472294682.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d4d000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 08b7103039688a93eaf1180d1b1cb77dc69411996d77657a2ce19ec943864183
                                                            • Instruction ID: 16029944ad77656b2770deb5d7f2a6e95845dd804a593ae487045c7dbafd959d
                                                            • Opcode Fuzzy Hash: 08b7103039688a93eaf1180d1b1cb77dc69411996d77657a2ce19ec943864183
                                                            • Instruction Fuzzy Hash: 1A21C275604344DFDB24DF14D9C4B16BB66EB84314F24C5ADE84A4B396C33AD847CA72
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7449b5d1f4a075f16f43a4c8a51bfcd40a78a6ffcfce77ef3ab09ec6c23daf4e
                                                            • Instruction ID: 7aed00653fbaace8fb1a0ab8f9e60ab300c1b58ef71906d79dc109b8116b1bf0
                                                            • Opcode Fuzzy Hash: 7449b5d1f4a075f16f43a4c8a51bfcd40a78a6ffcfce77ef3ab09ec6c23daf4e
                                                            • Instruction Fuzzy Hash: 7821F5B1D402589FEB54DFA5C995B9EBFF9AF48300F14842AE805A7240D7749945CB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472294682.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d4d000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 53906468979d10763d79783cab55798dcba57719d95d799bce6edfc53a5c47cf
                                                            • Instruction ID: 6cdc4722b9912b0f26535a3f0fe376f6ba82a29f7b08ce7a8fd84768ec5460ce
                                                            • Opcode Fuzzy Hash: 53906468979d10763d79783cab55798dcba57719d95d799bce6edfc53a5c47cf
                                                            • Instruction Fuzzy Hash: 932162755093C08FCB16CF24D994715BF72EB46314F28C5EAD8498F6A7C33A984ACB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 96f3471517d5d345bcaa270540708f0c42ab21afe5938c27006408a7c5eeb8a2
                                                            • Instruction ID: fae675f4e45fd8e1e67d224fb4b261ce5526e93f5b52678573582619f8497356
                                                            • Opcode Fuzzy Hash: 96f3471517d5d345bcaa270540708f0c42ab21afe5938c27006408a7c5eeb8a2
                                                            • Instruction Fuzzy Hash: ED118E742012045FC699AB35F89496E7FEBEEC2296B044818E50A8F685CD217A4A87F6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472077046.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d3d000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                            • Instruction ID: 4ca11251baa8cfda60c78659664f94d519e967e11111f66167068d681e66669b
                                                            • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                            • Instruction Fuzzy Hash: 3611D376504240DFCB16CF14E9C4B16BF72FB94324F28C6A9D8490B656C33AE856CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e1ecc1bb231ee4205929ed0f811393693426ce6ba2ab95a6cf7df3b153a91c2d
                                                            • Instruction ID: 60a9f43e9ee03ba1bf439e90dc3f2d52a3a143337101513029ad078eb9be83b3
                                                            • Opcode Fuzzy Hash: e1ecc1bb231ee4205929ed0f811393693426ce6ba2ab95a6cf7df3b153a91c2d
                                                            • Instruction Fuzzy Hash: B201E5356043048FD3259F71E40466E3BA7EFC5311F148629E4468B644CF74A90A8BA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba0868126b8f5e36f835241410d856263bed578a074f1bf598a0967828de9ba0
                                                            • Instruction ID: 058194ef2b641164ea7839b7cfefa44f4b57e90c90c997c9a163b8d2cab9cbc3
                                                            • Opcode Fuzzy Hash: ba0868126b8f5e36f835241410d856263bed578a074f1bf598a0967828de9ba0
                                                            • Instruction Fuzzy Hash: 25018471B102199BDF10DEA9EC45ABFBBFAEBC4251F148036F905D3240DB74991587A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc5ae17ae45a07f3ffdf31862e22cad7cd809709800da150f01912b453a59648
                                                            • Instruction ID: 55b5c7d34066f4a7a4aeb8f92919e3fff59042fc0f5da5bdc850141f79351b56
                                                            • Opcode Fuzzy Hash: bc5ae17ae45a07f3ffdf31862e22cad7cd809709800da150f01912b453a59648
                                                            • Instruction Fuzzy Hash: 6F017C752002054B8698AB38F99452E7BE3FEC1256B54482CE507CF6C4DE707E4F97AA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 21a99fd0e25efef63b415a38be8e5f0db2833d1e6395f6be4f6ed8d20fb47ea5
                                                            • Instruction ID: f5ba98f62dd7bbd9a7ecaf2220f8261656b5b04f6cf35bfd0b0f3d57ce5256ad
                                                            • Opcode Fuzzy Hash: 21a99fd0e25efef63b415a38be8e5f0db2833d1e6395f6be4f6ed8d20fb47ea5
                                                            • Instruction Fuzzy Hash: F001F934618308AFCB16DF74DC1485A3FBAEF86200B1484E9E505CB262DA36ED15D7A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 746f43b2efe11b22fc006f037635ae25c2c32f80b9595855416b9b1d4c02d43f
                                                            • Instruction ID: d0fe586f818d3d3d2afa246f43f969bed4a732edc99d4510244c5a8d150e0af1
                                                            • Opcode Fuzzy Hash: 746f43b2efe11b22fc006f037635ae25c2c32f80b9595855416b9b1d4c02d43f
                                                            • Instruction Fuzzy Hash: 6001B535A11701CFDBA68A71E91433BBFF3BF80205F59887DD84286654DA35D485CB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7b5716ab827073e80e6b028eb62717a4d284915ae6c8fe4a01d7c1cc8b022437
                                                            • Instruction ID: 189cb40b85628df9ab5e14e69f8521a7858f47df60c711b85038ba6bb939c491
                                                            • Opcode Fuzzy Hash: 7b5716ab827073e80e6b028eb62717a4d284915ae6c8fe4a01d7c1cc8b022437
                                                            • Instruction Fuzzy Hash: BCF0C2372081D82FCB524EAA5C11EFB3FEDDB8E251B084096FE94C2252C02DC9119770
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a482c07c1eda9541d41da93705aa378ce5612f86c4a85a71ddae109ddcbaecb4
                                                            • Instruction ID: 7dd04750722e0067bd48ea2d98fe60112152e37a87c6467e6e41f74f258d5031
                                                            • Opcode Fuzzy Hash: a482c07c1eda9541d41da93705aa378ce5612f86c4a85a71ddae109ddcbaecb4
                                                            • Instruction Fuzzy Hash: CF019E366007088FD364AF75E44465E7BE3EBC4312F148A2DD54A8B748DF74A90A8BA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 45bca037d901a42b68f3e2dc912e66dfc6b8076f1dc2c9b3105919299bc42043
                                                            • Instruction ID: 1bae945ee7758467067d28f7ddaae601ee142c2b1afe4b6673947d47372085aa
                                                            • Opcode Fuzzy Hash: 45bca037d901a42b68f3e2dc912e66dfc6b8076f1dc2c9b3105919299bc42043
                                                            • Instruction Fuzzy Hash: 050144B4C44219EFDB44CFA4C8457AEBBF1FB08300F1080A9D855A3340D3344A80CB94
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ae8a3498db57ec8dffbade1612a52a3698ecb165c4d22630f1af1bb2490904a
                                                            • Instruction ID: 8119c6f50cd9a1bfcacde821eaad8922df9d63becfe8eef5ea78f531122a382d
                                                            • Opcode Fuzzy Hash: 0ae8a3498db57ec8dffbade1612a52a3698ecb165c4d22630f1af1bb2490904a
                                                            • Instruction Fuzzy Hash: F401D131101B04AFD7269F22E808962BFFAFF89301700C61AE48682A14CB75A50ECFE4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7f2543c3b6312dc1f456e38d44c3d0a2e233e525594d6eeea7771536e9ec8add
                                                            • Instruction ID: 7e30e72e640ec9e26aa77c927b678aa6c0e387ae4a53d45c8b8c64fdd5cb132e
                                                            • Opcode Fuzzy Hash: 7f2543c3b6312dc1f456e38d44c3d0a2e233e525594d6eeea7771536e9ec8add
                                                            • Instruction Fuzzy Hash: 21F0E9312052446FC3912B6AA85599B7FDADF8B365F00005DF10AC7242C925184943B1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e55267e79e734a69d2878a458b4824f7729bb4e6cc7295f1f71cd17d8c9f8ffb
                                                            • Instruction ID: 68923cdfb6746e054f9cab012777c6fa8cbf7d293b5722147b55495046f60b37
                                                            • Opcode Fuzzy Hash: e55267e79e734a69d2878a458b4824f7729bb4e6cc7295f1f71cd17d8c9f8ffb
                                                            • Instruction Fuzzy Hash: 0701D2B4D4421AEFDB44DFA9D9446AEBFF5FB49301F1080AAD959A3350E7740A80CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472077046.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d3d000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7e2a1252f73a70e145d93ac6d4d6abbca70f364bdaf54e2d77672bc69c2269c2
                                                            • Instruction ID: dd02f2cad706e42a9aec624482f6fed777ecd99aed4c3cfdc80baa6241aaff9d
                                                            • Opcode Fuzzy Hash: 7e2a1252f73a70e145d93ac6d4d6abbca70f364bdaf54e2d77672bc69c2269c2
                                                            • Instruction Fuzzy Hash: EAF04976200604AF83209F0ADC85C23FBAEFBD4770719C09AE84A8B612C631EC01CEB0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf06834e3ee615cf2f58dd6da295505cfedcc3b1b2586a89e9b4402cea0d2958
                                                            • Instruction ID: 73e877f006470e2e90945fd1ecdc200d2763e34c1c908d2733b64fdf01d1e28e
                                                            • Opcode Fuzzy Hash: bf06834e3ee615cf2f58dd6da295505cfedcc3b1b2586a89e9b4402cea0d2958
                                                            • Instruction Fuzzy Hash: 18F059B13082642FC36217396C140AE3FA5D98736234500CFE143CB291CE04490683F7
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a784e7ca501fb85879c71d9301c1247bf428c53f6e31f7afbab17c9fb92a14c3
                                                            • Instruction ID: 640f0ee4a432f0a000bb4bfd549db626963fec787a13d2535aff5a06ed15e41f
                                                            • Opcode Fuzzy Hash: a784e7ca501fb85879c71d9301c1247bf428c53f6e31f7afbab17c9fb92a14c3
                                                            • Instruction Fuzzy Hash: DFF09035BA03006BD7609A249C41F767FE5DB42715F158266F614CF1E2D7A2E8069741
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d602c74eb6a544c6c9cf7c7d29a78a9ed3b3ae02b5a68c89414a1ffda6350a88
                                                            • Instruction ID: 3a16e1c57d9d4a27683c6026554b1b7c6e4863f89a4067467cd60f200ece0803
                                                            • Opcode Fuzzy Hash: d602c74eb6a544c6c9cf7c7d29a78a9ed3b3ae02b5a68c89414a1ffda6350a88
                                                            • Instruction Fuzzy Hash: 85F096311057D05FC3229739F814A9B3FEADF82205B08055AF1428B652CA65690987B6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7585a783b1a6bdff90aa57024d624b93f95f4b73947bc6e6157dbca12baa6935
                                                            • Instruction ID: c7eb753fda5bb279d2df9f8d9321cb2126424d48c6f331b9550bb62ffd89445e
                                                            • Opcode Fuzzy Hash: 7585a783b1a6bdff90aa57024d624b93f95f4b73947bc6e6157dbca12baa6935
                                                            • Instruction Fuzzy Hash: F6F037762041E83F8B555E9A5C50CFB7FEDDA8E162B084156FEE8D2242C42DC921ABB0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472077046.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d3d000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4fe4d229a1c154448ec1331dfc8c28fd229f3b241e3626cc845d2953df4fcdef
                                                            • Instruction ID: d6f6b6e901a5e849ff4e64e6663e7f9089071da5e28fe6e730d3a7edfce31ecb
                                                            • Opcode Fuzzy Hash: 4fe4d229a1c154448ec1331dfc8c28fd229f3b241e3626cc845d2953df4fcdef
                                                            • Instruction Fuzzy Hash: 40F03C75104680AFD3258F05CD85C22BFB9EF857607198489E89A8B262C631FC42CF70
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88f4d77ba5f9af559fcb03cf69d25944fd457a355e9400dc831872320f294f9a
                                                            • Instruction ID: 3887cae5bc1103bade0e927f3c7c7b1852b88b613d5ffcfc14d033af4bec94a5
                                                            • Opcode Fuzzy Hash: 88f4d77ba5f9af559fcb03cf69d25944fd457a355e9400dc831872320f294f9a
                                                            • Instruction Fuzzy Hash: 2EF0A072B101295B9B509A6AAC49ABFBFF9EB84261B08403AF914D3200EB74980587A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f48c9e3da69e247d04d2ff4c397c421cf715f3f7175ac6c609129513c9f8002b
                                                            • Instruction ID: 07ac99dc75d1c81a7f7a7b9340de713613f3edaeb32045624bf26e3c8f18b20b
                                                            • Opcode Fuzzy Hash: f48c9e3da69e247d04d2ff4c397c421cf715f3f7175ac6c609129513c9f8002b
                                                            • Instruction Fuzzy Hash: 51F04FB5D48159DFDB40CBA0C4555AEBFB1EB5A301F0481DADC46E7351D6394A41CB41
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73acf1a420f68af1921f42eaee43675331528f611a68751556cbf3dca8442909
                                                            • Instruction ID: 96319cef262854458690e34f2b58ce849afe170e4a793398828a5118654564c5
                                                            • Opcode Fuzzy Hash: 73acf1a420f68af1921f42eaee43675331528f611a68751556cbf3dca8442909
                                                            • Instruction Fuzzy Hash: BCF0A034A10712CFDBA6CE26D810A77BBFBBF80215B45882CE84246914DAB1F485CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 096f444d11dc7168bca4ee72e5e32f123d7889b50f09fddbc64eba84b5adc9b8
                                                            • Instruction ID: 32cddf295cfb35bef60016b12c93e702ff8204a546a13b4da4131657c1a08c74
                                                            • Opcode Fuzzy Hash: 096f444d11dc7168bca4ee72e5e32f123d7889b50f09fddbc64eba84b5adc9b8
                                                            • Instruction Fuzzy Hash: 72E09B352011045BC3942B9AA44865F7ADBDFC9371F00402DF10EC7341CA65180947B5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 77db868221c043af9a7c8dea98bc5f550ddbc5d3008c8a726bdd64f9fff1fb17
                                                            • Instruction ID: ef7b9eaa2fda5656a9e5a2fa2fbe6a0435950cc2c1622a25a961f807e7e95e70
                                                            • Opcode Fuzzy Hash: 77db868221c043af9a7c8dea98bc5f550ddbc5d3008c8a726bdd64f9fff1fb17
                                                            • Instruction Fuzzy Hash: CBF09035500B019FD725DF26E408512BBF7FF88301B00C62EE44B82A14DB74A509CF84
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9c631e74def986319d5aca91a5d7d605e6a1cff591ee9f2509602306fca0d2bb
                                                            • Instruction ID: 254605a31e2c00ae1099ec908f11e1cb7be08d12d6e0f5d3d5ef350e5d1ad576
                                                            • Opcode Fuzzy Hash: 9c631e74def986319d5aca91a5d7d605e6a1cff591ee9f2509602306fca0d2bb
                                                            • Instruction Fuzzy Hash: 12E048353462546FC651BA25FC84DDB3FA9E787655F018256E00087646C734294A9BF3
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10558a57481183d54972889de2e8a13f80081d3942de1c524e5dc0b2b706dfee
                                                            • Instruction ID: 03a491256c9f299444e95b3daaae0f56db86fb44c4651fe9a3174731c847ec60
                                                            • Opcode Fuzzy Hash: 10558a57481183d54972889de2e8a13f80081d3942de1c524e5dc0b2b706dfee
                                                            • Instruction Fuzzy Hash: 07F03935D0160CBFCB11EFB4E9498CEBFB9EB84204F1442AAE905E3244EA305B49DB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70b627ea194cf55110892ff38e0a956b6b89905930d85d00bc41c9612f7c4b6d
                                                            • Instruction ID: c2545028b5f993cfeb26ad2c31f4e70a14778dcaa42dc2921d7afdc6a453d911
                                                            • Opcode Fuzzy Hash: 70b627ea194cf55110892ff38e0a956b6b89905930d85d00bc41c9612f7c4b6d
                                                            • Instruction Fuzzy Hash: 2DE06535600B504FC725AB39F40879E7BE7DF85315F08052DE2468B745CBA5780A8796
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 540cb07177421d83bbb1c34f9330610248f6579a98720e2990a71a44cb4c2a1a
                                                            • Instruction ID: 1158dcc678ae631ae439faf5d0954fd1b1f9827d7074737d896625d52e1133cc
                                                            • Opcode Fuzzy Hash: 540cb07177421d83bbb1c34f9330610248f6579a98720e2990a71a44cb4c2a1a
                                                            • Instruction Fuzzy Hash: 84E0D838245380FFD752B624B845D973FB9DB43614B014046F8408B645C7386D4587B1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 03a0d879cde165afa8f84b8c4e44f587ecdf745f2daca8ad806a34869a0d3b90
                                                            • Instruction ID: 9e8c132fa580f5d79463039c60aaa2af6ce7378bbbf7345d0208a13817450ba0
                                                            • Opcode Fuzzy Hash: 03a0d879cde165afa8f84b8c4e44f587ecdf745f2daca8ad806a34869a0d3b90
                                                            • Instruction Fuzzy Hash: 2EE092B210C3109FD345DB20E8019667BA4EB95220B068C6EE484C7141E635D841C799
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 53abceba8016cc397df132f8ee75e143a457d8c9e638413105dc95870ec80191
                                                            • Instruction ID: a2822fe00491e165e603ebef22e497bafd21ed9ff6dff748fadaee60afe1a707
                                                            • Opcode Fuzzy Hash: 53abceba8016cc397df132f8ee75e143a457d8c9e638413105dc95870ec80191
                                                            • Instruction Fuzzy Hash: 61E0173922A248BFC702AB69DC41C973F7DEF4A66430941C6F5418F273C622A921DBF1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3afc441a7e62599c82ad90bd5a0b5cd66cc16806c673af636d0eb84df2b4e91a
                                                            • Instruction ID: ec788b0642758e76bb66c626c6fa2b1f22cf0538770af23544bad8a96631bf33
                                                            • Opcode Fuzzy Hash: 3afc441a7e62599c82ad90bd5a0b5cd66cc16806c673af636d0eb84df2b4e91a
                                                            • Instruction Fuzzy Hash: 7AE0D8396057409FC701FB20FC819963BE1E74A600F018046E8005B1AAC7782E4997E2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fe172bcc4f3208ed82d31b52a1afe72c7b925010b39e23c96b0a8f75ed235189
                                                            • Instruction ID: 9449ba0cd6b391a66e6690e1a6f2422e9c1f41ea2015908f75e5b717cc39f8d3
                                                            • Opcode Fuzzy Hash: fe172bcc4f3208ed82d31b52a1afe72c7b925010b39e23c96b0a8f75ed235189
                                                            • Instruction Fuzzy Hash: DFE0D871A05244EFC701DF64FD5459D3BB2DB42201B1041D7D905DB291D6301F159752
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 44725d5441b9037306c6738d0bc6079a02a1c20e775839921ba3b1901707e20c
                                                            • Instruction ID: c9fe678f35ea61b20bfbe9d1a54a3ec29e575d5862be47a56275267e2ab4c61b
                                                            • Opcode Fuzzy Hash: 44725d5441b9037306c6738d0bc6079a02a1c20e775839921ba3b1901707e20c
                                                            • Instruction Fuzzy Hash: F6D05B353105186B8755276DB4584AE7B9BDBC5772305002EE607C7340CF691D4647E6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 72aa7b5a9459d11893bef8b1d748174bc5904d5b4062fd7693dcd65fb11f6876
                                                            • Instruction ID: aab437c07f0374ed56f536f2df13563ffbf0cb4288d9b4f2a35c9d35f34e742a
                                                            • Opcode Fuzzy Hash: 72aa7b5a9459d11893bef8b1d748174bc5904d5b4062fd7693dcd65fb11f6876
                                                            • Instruction Fuzzy Hash: C1E09275D0020CEFCF50EFE4E9458DDBBB9EB48200F1482AAD909A3204EB306B59DF80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60e85c6c93e570c8e4c7450c1dff7ae2c707c6451e05985bd105cade7e00d8f4
                                                            • Instruction ID: f41e02217ea22ec2a914cd05c8835d3acd0457be5edfae0cd867c0ee7481d25c
                                                            • Opcode Fuzzy Hash: 60e85c6c93e570c8e4c7450c1dff7ae2c707c6451e05985bd105cade7e00d8f4
                                                            • Instruction Fuzzy Hash: 6CD05B71E0020CFFCB40DFA8F94155D77F5EB45215B104199D509D7204DB312F04A795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dfb3e03d905145dc8d92f975623207f9423adaf455ff0b2f91ffb323c3fbb94b
                                                            • Instruction ID: 850063424d6eca7e79bc7939d509a84c079da19fb9b214b75f753873ed7ffe51
                                                            • Opcode Fuzzy Hash: dfb3e03d905145dc8d92f975623207f9423adaf455ff0b2f91ffb323c3fbb94b
                                                            • Instruction Fuzzy Hash: 86C012727001100B4294675C741406D75DBD2C81E3385412AF60EC3388DD614D4657A5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c0a88cb2f3c7c3ee9ee1b31b92e2c46c9335c9a9217d7c0caf262fb2c1e0af5
                                                            • Instruction ID: b285cd18fb30ecab9232c7b3f7970147dc69ad794a1f72d82645903595cd4476
                                                            • Opcode Fuzzy Hash: 8c0a88cb2f3c7c3ee9ee1b31b92e2c46c9335c9a9217d7c0caf262fb2c1e0af5
                                                            • Instruction Fuzzy Hash: 22B012B23301052FF7005220DD07F713D51D790F01F26C020B782A61C5CB99D00284B5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc975f13d044a69e527034fd9d57b7e4bc8ac5c7adf58d378c665b5fc965b10b
                                                            • Instruction ID: 2eed0b6423302f66513f710d636debc1f1ab4b2ef6335096760f7e76ad19039a
                                                            • Opcode Fuzzy Hash: fc975f13d044a69e527034fd9d57b7e4bc8ac5c7adf58d378c665b5fc965b10b
                                                            • Instruction Fuzzy Hash: D8C09B3158BBD06EDB0607B09C1EC463F399FD372571700CAB7418D0B7D5110005DBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f057690fd490e3c8b0c4ce8d9b1f7f97b276f92296249be73dea48bd0d50f1e
                                                            • Instruction ID: d3cd91b84efdfeecb14156b528a56a8609b0dff82db0ca51ab3e76b549ada69a
                                                            • Opcode Fuzzy Hash: 0f057690fd490e3c8b0c4ce8d9b1f7f97b276f92296249be73dea48bd0d50f1e
                                                            • Instruction Fuzzy Hash: AA6233B06003009FD748DF59D49971A7EE6EB84309F64C85CD0099F3D6DBBAE90B8BA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1f90323675e53bf6c2aee47d502b7a608a139b601ea80d39c1c7f65b030ac986
                                                            • Instruction ID: fbd4b4c6de156b94a53e612c917fbdd0b4dd42e928ffd98b64352c119e203228
                                                            • Opcode Fuzzy Hash: 1f90323675e53bf6c2aee47d502b7a608a139b601ea80d39c1c7f65b030ac986
                                                            • Instruction Fuzzy Hash: 6C6233B06003009FD748DF59D49971A7AE6EB84309F64C85CD0098F3D6DBBAE90B8BA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1fc63db6161b533b58b386515e93647e23accee2f8aa78c8e7efa35f15a11be0
                                                            • Instruction ID: abd9a97ee59e488851695410f8e8e604c2e0267f069b3218fa7d7b29e01d119d
                                                            • Opcode Fuzzy Hash: 1fc63db6161b533b58b386515e93647e23accee2f8aa78c8e7efa35f15a11be0
                                                            • Instruction Fuzzy Hash: 52A16C36A00216CFCF05DFB5C88459EBBB2FF84304B15856AEA05AB2A5DB75E945CF80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2472715795.00000000025F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025F0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_25f0000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3d462320443c10fb2fb24946ce724fd2a4a98bcdf552ed70fc2e105a8efedad8
                                                            • Instruction ID: 626a92a5e9ae232d16bc076699689d8fe93b8623b101c047f3339bcc54d2d44e
                                                            • Opcode Fuzzy Hash: 3d462320443c10fb2fb24946ce724fd2a4a98bcdf552ed70fc2e105a8efedad8
                                                            • Instruction Fuzzy Hash: 9831AD82C0ABD04FD71657795C612D62F90DB6B02CF094BC7C6A4CA2E3E914895FC3AB
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2474254222.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6050000_RP0143VgD8.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (_q$(_q$(_q$(_q$(_q$(_q
                                                            • API String ID: 0-744050660
                                                            • Opcode ID: 78ef18db22d6e3d4cc368e8d70a1ed742bfc6ec29172e629dfc520624c8a9efb
                                                            • Instruction ID: e0cb92bd5e8e9ec719ce5319b570b9d517180f6933580ee489b1e3d6aca3664e
                                                            • Opcode Fuzzy Hash: 78ef18db22d6e3d4cc368e8d70a1ed742bfc6ec29172e629dfc520624c8a9efb
                                                            • Instruction Fuzzy Hash: 98D1CD35A043049FDB059F68D8205AE7FB2EF85310F18846AED46DB391DA359E46CBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%