Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ciKdWsb5h4.exe

Overview

General Information

Sample name:ciKdWsb5h4.exe
renamed because original name is a hash value
Original sample name:bd129b2710c1f8fa9aa98dcc35c5b6b9.exe
Analysis ID:1431450
MD5:bd129b2710c1f8fa9aa98dcc35c5b6b9
SHA1:572034f781967e768d6d9b49de62217561538a45
SHA256:62c2c1f7335ed8b0a2120b1cf42a4c55cae1869a0245bef10d51de037e0d7ddf
Tags:32exe
Infos:

Detection

RedLine
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Installs new ROOT certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops certificate files (DER)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ciKdWsb5h4.exe (PID: 7632 cmdline: "C:\Users\user\Desktop\ciKdWsb5h4.exe" MD5: BD129B2710C1F8FA9AA98DCC35C5B6B9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["103.113.70.99:2630"], "Bot Id": "spoo", "Authorization Header": "a442868c38da8722ebccd4819def00b2"}
SourceRuleDescriptionAuthorStrings
ciKdWsb5h4.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1666032685.0000000000032000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      Process Memory Space: ciKdWsb5h4.exe PID: 7632JoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.ciKdWsb5h4.exe.30000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ciKdWsb5h4.exeMalware Configuration Extractor: RedLine {"C2 url": ["103.113.70.99:2630"], "Bot Id": "spoo", "Authorization Header": "a442868c38da8722ebccd4819def00b2"}
          Source: 103.113.70.99:2630Virustotal: Detection: 10%Perma Link
          Source: ciKdWsb5h4.exeReversingLabs: Detection: 83%
          Source: ciKdWsb5h4.exeVirustotal: Detection: 76%Perma Link
          Source: ciKdWsb5h4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: ciKdWsb5h4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb9 source: ciKdWsb5h4.exe, 00000000.00000002.2922388581.0000000000791000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EE3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb' source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EF1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EF1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2924252741.0000000005E94000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2922388581.0000000000791000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EE3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdba source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EE3000.00000004.00000020.00020000.00000000.sdmp

          Networking

          barindex
          Source: Malware configuration extractorURLs: 103.113.70.99:2630
          Source: global trafficTCP traffic: 192.168.2.4:49730 -> 103.113.70.99:2630
          Source: Joe Sandbox ViewIP Address: 103.113.70.99 103.113.70.99
          Source: Joe Sandbox ViewASN Name: NETCONNECTWIFI-ASNetConnectWifiPvtLtdIN NETCONNECTWIFI-ASNetConnectWifiPvtLtdIN
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: unknownTCP traffic detected without corresponding DNS query: 103.113.70.99
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Responsex
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9LR
          Source: ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Responsex
          Source: ciKdWsb5h4.exeString found in binary or memory: https://api.ip.sb/ip
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp434B.tmpJump to dropped file
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp435C.tmpJump to dropped file
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_022B25D80_2_022B25D8
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_022BDC740_2_022BDC74
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B367D80_2_05B367D8
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B3A3D80_2_05B3A3D8
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B33F500_2_05B33F50
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B36FF30_2_05B36FF3
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B36FF80_2_05B36FF8
          Source: ciKdWsb5h4.exe, 00000000.00000000.1666059017.0000000000076000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUpspearing.exe8 vs ciKdWsb5h4.exe
          Source: ciKdWsb5h4.exe, 00000000.00000002.2922388581.000000000075E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ciKdWsb5h4.exe
          Source: ciKdWsb5h4.exeBinary or memory string: OriginalFilenameUpspearing.exe8 vs ciKdWsb5h4.exe
          Source: ciKdWsb5h4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: classification engineClassification label: mal80.troj.winEXE@1/4@0/1
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeMutant created: NULL
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp434B.tmpJump to behavior
          Source: ciKdWsb5h4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: ciKdWsb5h4.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: ciKdWsb5h4.exeReversingLabs: Detection: 83%
          Source: ciKdWsb5h4.exeVirustotal: Detection: 76%
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: msvcp140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: esdsip.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: linkinfo.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
          Source: Google Chrome.lnk.0.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: ciKdWsb5h4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: ciKdWsb5h4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: ciKdWsb5h4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb9 source: ciKdWsb5h4.exe, 00000000.00000002.2922388581.0000000000791000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EE3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb' source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EF1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EF1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2924252741.0000000005E94000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2922388581.0000000000791000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EE3000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdba source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EE3000.00000004.00000020.00020000.00000000.sdmp
          Source: ciKdWsb5h4.exeStatic PE information: 0xF0DBE6BE [Sun Jan 19 04:14:54 2098 UTC]
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B3DFD1 push es; ret 0_2_05B3DFE6
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B3ECF2 push eax; ret 0_2_05B3ED01
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeCode function: 0_2_05B349AB push FFFFFF8Bh; retf 0_2_05B349AD

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeMemory allocated: A00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeMemory allocated: 23E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeMemory allocated: 21F0000 memory reserve | memory write watchJump to behavior
          Source: ciKdWsb5h4.exe, 00000000.00000002.2924328877.0000000005EF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Users\user\Desktop\ciKdWsb5h4.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\ciKdWsb5h4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: ciKdWsb5h4.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.ciKdWsb5h4.exe.30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1666032685.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ciKdWsb5h4.exe PID: 7632, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: ciKdWsb5h4.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.ciKdWsb5h4.exe.30000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1666032685.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ciKdWsb5h4.exe PID: 7632, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Masquerading
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Disable or Modify Tools
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Obfuscated Files or Information
          NTDS1
          File and Directory Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Install Root Certificate
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Timestomp
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ciKdWsb5h4.exe83%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
          ciKdWsb5h4.exe76%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://api.ip.sb/ip0%URL Reputationsafe
          http://tempuri.org/Entity/Id18Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id20LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id24LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id15Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id22LR0%Avira URL Cloudsafe
          http://tempuri.org/0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id19LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id17LR0%Avira URL Cloudsafe
          http://tempuri.org/2%VirustotalBrowse
          http://tempuri.org/Entity/Id22Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id19LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id17LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id22LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id15Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id15LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id9LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id61%VirustotalBrowse
          http://tempuri.org/Entity/Id10Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id20LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id19Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id22Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id13LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id7LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id11LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id19Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id11LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id13LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id1LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id24LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id5LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id7LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id1LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id3LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id10Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id6Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id15LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id7Responsex0%Avira URL Cloudsafe
          103.113.70.99:26300%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id9LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id3LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id1Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id5LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id21Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id6Responsex2%VirustotalBrowse
          http://tempuri.org/Entity/Id23Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id23LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id7Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id21LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id5Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id14Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id1Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id23Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id2Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id23LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id11Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id20Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id2Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id21LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id8Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id18LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id14Responsex1%VirustotalBrowse
          103.113.70.99:263011%VirustotalBrowse
          http://tempuri.org/Entity/Id20Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id8Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id13Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id16Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id18LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id16LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id8LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id5Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id14LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id18Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id6LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id13Responsex0%VirustotalBrowse
          http://tempuri.org/Entity/Id21Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id12LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id8LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id9Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id10LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/3%VirustotalBrowse
          http://tempuri.org/Entity/Id3Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id12LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id4LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id24Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id2LR0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id14LR2%VirustotalBrowse
          http://tempuri.org/Entity/Id12Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id11Responsex1%VirustotalBrowse
          http://tempuri.org/Entity/Id17Responsex0%Avira URL Cloudsafe
          http://tempuri.org/Entity/Id4Responsex0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          103.113.70.99:2630true
          • 11%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://tempuri.org/Entity/Id24LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id22LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id20LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id15ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id18ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/soap/envelope/ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://tempuri.org/ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id19LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id17LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id22ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id6ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id15LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id9LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id10ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id19ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id13LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id7LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://tempuri.org/Entity/Id11LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponseciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://tempuri.org/Entity/Id1LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://tempuri.org/Entity/Id5LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • 2%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://tempuri.org/Entity/Id3LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • 2%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://tempuri.org/Entity/Id6ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • 2%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://tempuri.org/Entity/Id7ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://tempuri.org/Entity/Id1ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://tempuri.org/Entity/Id21ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://api.ip.sb/ipciKdWsb5h4.exefalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgementciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://tempuri.org/Entity/Id23LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id21LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id5ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://tempuri.org/Entity/Id14ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id2ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id11ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id20ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://tempuri.org/Entity/Id8ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 1%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id18LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 2%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id13ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id16ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id16LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id8LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 2%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id14LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 2%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id6LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/ciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 3%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id12LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 2%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id9ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2004/08/addressingciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://tempuri.org/Entity/Id10LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id3ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id4LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id24ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://tempuri.org/Entity/Id2LRciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/rmciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessageciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://tempuri.org/Entity/Id12ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id17ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/soap/actor/nextciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://tempuri.org/Entity/Id4ResponsexciKdWsb5h4.exe, 00000000.00000002.2923053111.00000000023E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      103.113.70.99
                                      unknownIndia
                                      133973NETCONNECTWIFI-ASNetConnectWifiPvtLtdINtrue
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1431450
                                      Start date and time:2024-04-25 05:57:05 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 30s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:5
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:ciKdWsb5h4.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:bd129b2710c1f8fa9aa98dcc35c5b6b9.exe
                                      Detection:MAL
                                      Classification:mal80.troj.winEXE@1/4@0/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 78
                                      • Number of non-executed functions: 5
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      103.113.70.99RP0143VgD8.exeGet hashmaliciousRedLineBrowse
                                        CQPfRTSy7N.exeGet hashmaliciousRedLineBrowse
                                          G4jZEW68K1.exeGet hashmaliciousRedLineBrowse
                                            X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                              X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                                dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                  dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                    K2xdxHSWJK.exeGet hashmaliciousRedLineBrowse
                                                      XHr735qu8v.exeGet hashmaliciousRedLineBrowse
                                                        gm5v3JlTMk.exeGet hashmaliciousRedLineBrowse
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          NETCONNECTWIFI-ASNetConnectWifiPvtLtdINRP0143VgD8.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          CQPfRTSy7N.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          G4jZEW68K1.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          X8K556WeiK.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          dmA2g7xZV7.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          K2xdxHSWJK.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          XHr735qu8v.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          gm5v3JlTMk.exeGet hashmaliciousRedLineBrowse
                                                          • 103.113.70.99
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\ciKdWsb5h4.exe
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:32 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                                          Category:dropped
                                                          Size (bytes):2104
                                                          Entropy (8bit):3.4601743543125636
                                                          Encrypted:false
                                                          SSDEEP:48:8SDdPTndGRYrnvPdAKRkdAGdAKRFdAKR/U:8SR5
                                                          MD5:93296231F661D8ACBE442350CB2E343E
                                                          SHA1:6A5691873D199EFEB60BE972B68300C348B44C6D
                                                          SHA-256:5C3ED758D68B99F99C8F9E79D74B30B999E0F39C449BC91A2EDF744A65A364D2
                                                          SHA-512:9B52AFC361FB748FBCA5410B9284AE501DA620CB78C3207583E34DB3266D62636FFF24AC3F706C65443F6B462EC27F7AD2EE2027071094226D63E1B7275A0C38
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:L..................F.@.. ......,.....d'........q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IDW5`....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWQ`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWQ`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWQ`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDWI`..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                                          Process:C:\Users\user\Desktop\ciKdWsb5h4.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2662
                                                          Entropy (8bit):7.8230547059446645
                                                          Encrypted:false
                                                          SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                          MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                          SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                          SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                          SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                          Process:C:\Users\user\Desktop\ciKdWsb5h4.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2662
                                                          Entropy (8bit):7.8230547059446645
                                                          Encrypted:false
                                                          SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                          MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                          SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                          SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                          SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                          Process:C:\Users\user\Desktop\ciKdWsb5h4.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2251
                                                          Entropy (8bit):7.634466947125037
                                                          Encrypted:false
                                                          SSDEEP:48:S7SjQDUCrOSnnq8e8ychIa6kmJsrgvfTxbchRayHllRchxZ:ASUDn28yla6kVgvlgtFY5
                                                          MD5:373B17759310F94FA7E099063BB941CC
                                                          SHA1:0C173BDBC01BBD66B37228664E059A77B21EAFC7
                                                          SHA-256:A176EA03BBCF5AF7352D45CAEC94EE1967A0613D2DF6853D6BA7390D238B0C86
                                                          SHA-512:4C55FF1C9F404C741F3CC4C1C9940C505A96576AFA8914CE0F777214BC95D93C49BC8A1D4C14EBBB2857306DF39C182272B73C6E26273D282BACADD6FB88AD16
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:........'...............P...............{41744BE4-11C5-494C-A213-BA0CE944938E}.....................RSA1..................v..XU~l2_.......vj....b.... ..&...X.Y...=q...).....`.1.0..~......5DL. ..S>.......<..y...*?YOA.... eb.QD..B..<.!..'J..+.'...4fu.z./....]@.y.b...o...).j'......0}B.*j..R..-..2.....'=...@....s....;. .v=..;...\$...G....2S....al.ZQ.Q...w...aXzW.....................z..O........"(&.JO....SM.'....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... ....(..*k.Q&..O...1...j...`....-............... .....M@$b.E...p]..q.$..t..d..<%....P.......I.0...:...c..........@.[...K..S)..|..\./&.C&.%`..A]O..v...qx.P.0..x....,.^>.F...Y.G...C#.......hy....;hkT.C..?.&..%....0..I...9y|.C.)1.Q.L#...)r.E...z[.T.f..N$...9S..p.sL.wu.....l.Z?:'pa............ZE...p......R.;}.....>Z.W...^.e.m.p.....%.0y.$..Q.._....r..........X...`T.0.oC..6.9:..Xv?..1?f7A...\...?.}[.PH.y.JS~>..".!rUvb.1...C..<..@...........~Y..y"....#...:U.+.B..a....}...8.<..]....M...xa14S..J
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):5.082418228904906
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          File name:ciKdWsb5h4.exe
                                                          File size:311'296 bytes
                                                          MD5:bd129b2710c1f8fa9aa98dcc35c5b6b9
                                                          SHA1:572034f781967e768d6d9b49de62217561538a45
                                                          SHA256:62c2c1f7335ed8b0a2120b1cf42a4c55cae1869a0245bef10d51de037e0d7ddf
                                                          SHA512:abb8770681cd51454d3f2f4539f58133af88168d35934a4638a611c579d07018f256a9a8358c9723c8a985254bcf593556a886692781fa57016a82475f147e86
                                                          SSDEEP:6144:/qY6irwP7YfmrYiJv7TAPAzdcZqf7DI/L:/nwPkiJvGAzdcUzs/
                                                          TLSH:04645C1823EC8911E27F4B7994A1E274D375ED56A452E30F4ED06CAB3E32741FA11AB2
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ... ....@.. ....................... ............@................................
                                                          Icon Hash:4d8ea38d85a38e6d
                                                          Entrypoint:0x42b9ae
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0xF0DBE6BE [Sun Jan 19 04:14:54 2098 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          popad
                                                          add byte ptr [ebp+00h], dh
                                                          je 00007F0CED02A822h
                                                          outsd
                                                          add byte ptr [esi+00h], ah
                                                          imul eax, dword ptr [eax], 006C006Ch
                                                          xor eax, 59007400h
                                                          add byte ptr [edi+00h], dl
                                                          push edx
                                                          add byte ptr [ecx+00h], dh
                                                          popad
                                                          add byte ptr [edi+00h], dl
                                                          push esi
                                                          add byte ptr [edi+00h], ch
                                                          popad
                                                          add byte ptr [ebp+00h], ch
                                                          push 61006800h
                                                          add byte ptr [ebp+00h], ch
                                                          dec edx
                                                          add byte ptr [eax], bh
                                                          add byte ptr [edi+00h], dl
                                                          push edi
                                                          add byte ptr [ecx], bh
                                                          add byte ptr [ecx+00h], bh
                                                          bound eax, dword ptr [eax]
                                                          xor al, byte ptr [eax]
                                                          insb
                                                          add byte ptr [eax+00h], bl
                                                          pop ecx
                                                          add byte ptr [edi+00h], dl
                                                          js 00007F0CED02A822h
                                                          jnc 00007F0CED02A822h
                                                          pop edx
                                                          add byte ptr [eax+00h], bl
                                                          push ecx
                                                          add byte ptr [ebx+00h], cl
                                                          popad
                                                          add byte ptr [edi+00h], dl
                                                          dec edx
                                                          add byte ptr [ebp+00h], dh
                                                          pop edx
                                                          add byte ptr [edi+00h], dl
                                                          jo 00007F0CED02A822h
                                                          imul eax, dword ptr [eax], 5Ah
                                                          add byte ptr [ebp+00h], ch
                                                          jo 00007F0CED02A822h
                                                          je 00007F0CED02A822h
                                                          bound eax, dword ptr [eax]
                                                          push edi
                                                          add byte ptr [eax+eax+77h], dh
                                                          add byte ptr [ecx+00h], bl
                                                          xor al, byte ptr [eax]
                                                          xor eax, 63007300h
                                                          add byte ptr [edi+00h], al
                                                          push esi
                                                          add byte ptr [ecx+00h], ch
                                                          popad
                                                          add byte ptr [edx], dh
                                                          add byte ptr [eax+00h], bh
                                                          je 00007F0CED02A822h
                                                          bound eax, dword ptr [eax]
                                                          insd
                                                          add byte ptr [eax+eax+76h], dh
                                                          add byte ptr [edx+00h], bl
                                                          push edi
                                                          add byte ptr [ecx], bh
                                                          add byte ptr [eax+00h], dh
                                                          popad
                                                          add byte ptr [edi+00h], al
                                                          cmp dword ptr [eax], eax
                                                          insd
                                                          add byte ptr [edx+00h], bl
                                                          push edi
                                                          add byte ptr [esi+00h], cl
                                                          cmp byte ptr [eax], al
                                                          push esi
                                                          add byte ptr [eax+00h], cl
                                                          dec edx
                                                          add byte ptr [esi+00h], dh
                                                          bound eax, dword ptr [eax]
                                                          insd
                                                          add byte ptr [eax+00h], bh
                                                          jo 00007F0CED02A822h
                                                          bound eax, dword ptr [eax]
                                                          insd
                                                          add byte ptr [ebx+00h], dh
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2b95c0x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x1c9d4.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x2b9400x1c.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x2e9940x2ec0064c48738b5efa1379746874c338807d5False0.4696168950534759data6.205450376900145IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x320000x1c9d40x1cc005b3e8f48de8a05507379330b3cf331a7False0.23725373641304348data2.6063301335912525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x500000xc0x400f921873e0b7f3fe3399366376917ef43False0.025390625data0.05390218305374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x321a00x3d04PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9934058898847631
                                                          RT_ICON0x35eb40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.09013072282030049
                                                          RT_ICON0x466ec0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.13905290505432216
                                                          RT_ICON0x4a9240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.17033195020746889
                                                          RT_ICON0x4cedc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.2045028142589118
                                                          RT_ICON0x4df940x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24645390070921985
                                                          RT_GROUP_ICON0x4e40c0x5adata0.7666666666666667
                                                          RT_VERSION0x4e4780x35adata0.4417249417249417
                                                          RT_MANIFEST0x4e7e40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 25, 2024 05:57:57.833750963 CEST497302630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:57:58.839483976 CEST497302630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:00.855005980 CEST497302630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:04.870498896 CEST497302630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:12.886183023 CEST497302630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:23.935637951 CEST497372630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:24.948749065 CEST497372630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:26.964272022 CEST497372630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:30.964402914 CEST497372630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:38.964427948 CEST497372630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:49.997570038 CEST497382630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:51.011176109 CEST497382630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:53.011199951 CEST497382630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:58:57.011187077 CEST497382630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:05.011373997 CEST497382630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:16.031699896 CEST497402630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:17.042468071 CEST497402630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:19.058190107 CEST497402630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:23.073756933 CEST497402630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:31.089340925 CEST497402630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:42.122489929 CEST497412630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:43.136220932 CEST497412630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:45.136295080 CEST497412630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:49.151844978 CEST497412630192.168.2.4103.113.70.99
                                                          Apr 25, 2024 05:59:57.151979923 CEST497412630192.168.2.4103.113.70.99

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Target ID:0
                                                          Start time:05:57:56
                                                          Start date:25/04/2024
                                                          Path:C:\Users\user\Desktop\ciKdWsb5h4.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\ciKdWsb5h4.exe"
                                                          Imagebase:0x30000
                                                          File size:311'296 bytes
                                                          MD5 hash:BD129B2710C1F8FA9AA98DCC35C5B6B9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1666032685.0000000000032000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:6.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:52
                                                            Total number of Limit Nodes:9
                                                            execution_graph 27376 22b4668 27377 22b4684 27376->27377 27378 22b4696 27377->27378 27380 22b47a0 27377->27380 27381 22b47c5 27380->27381 27385 22b48a1 27381->27385 27389 22b48b0 27381->27389 27386 22b48d7 27385->27386 27387 22b49b4 27386->27387 27393 22b4248 27386->27393 27390 22b48d7 27389->27390 27391 22b49b4 27390->27391 27392 22b4248 CreateActCtxA 27390->27392 27392->27391 27394 22b5940 CreateActCtxA 27393->27394 27396 22b5a03 27394->27396 27396->27396 27399 22bad38 27400 22bad47 27399->27400 27403 22bae20 27399->27403 27411 22bae30 27399->27411 27404 22bae41 27403->27404 27405 22bae64 27403->27405 27404->27405 27419 22bb0b8 27404->27419 27423 22bb0c8 27404->27423 27405->27400 27406 22bae5c 27406->27405 27407 22bb068 GetModuleHandleW 27406->27407 27408 22bb095 27407->27408 27408->27400 27412 22bae41 27411->27412 27413 22bae64 27411->27413 27412->27413 27417 22bb0b8 LoadLibraryExW 27412->27417 27418 22bb0c8 LoadLibraryExW 27412->27418 27413->27400 27414 22bae5c 27414->27413 27415 22bb068 GetModuleHandleW 27414->27415 27416 22bb095 27415->27416 27416->27400 27417->27414 27418->27414 27420 22bb0dc 27419->27420 27422 22bb101 27420->27422 27427 22ba870 27420->27427 27422->27406 27424 22bb0dc 27423->27424 27425 22bb101 27424->27425 27426 22ba870 LoadLibraryExW 27424->27426 27425->27406 27426->27425 27428 22bb2a8 LoadLibraryExW 27427->27428 27430 22bb321 27428->27430 27430->27422 27431 22bd0b8 27432 22bd0fe GetCurrentProcess 27431->27432 27434 22bd149 27432->27434 27435 22bd150 GetCurrentThread 27432->27435 27434->27435 27436 22bd18d GetCurrentProcess 27435->27436 27437 22bd186 27435->27437 27438 22bd1c3 27436->27438 27437->27436 27439 22bd1eb GetCurrentThreadId 27438->27439 27440 22bd21c 27439->27440 27397 22bd300 DuplicateHandle 27398 22bd396 27397->27398

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 472 5b33f50-5b33f84 475 5b33f92-5b33fa5 472->475 476 5b33f86-5b33f8f 472->476 477 5b34215-5b34219 475->477 478 5b33fab-5b33fae 475->478 476->475 480 5b3421b-5b3422b 477->480 481 5b3422e-5b34238 477->481 482 5b33fb0-5b33fb5 478->482 483 5b33fbd-5b33fc9 478->483 480->481 482->483 484 5b34253-5b34299 483->484 485 5b33fcf-5b33fe1 483->485 497 5b3429b-5b342a5 484->497 498 5b342a8-5b342d0 484->498 489 5b33fe7-5b3403a 485->489 490 5b3414d-5b3415b 485->490 520 5b3404a 489->520 521 5b3403c-5b34048 call 5b33c88 489->521 495 5b34161-5b3416f 490->495 496 5b341e0-5b341e2 490->496 499 5b34171-5b34176 495->499 500 5b3417e-5b3418a 495->500 501 5b341f0-5b341fc 496->501 502 5b341e4-5b341ea 496->502 497->498 517 5b342d6-5b342ef 498->517 518 5b34425-5b34443 498->518 499->500 500->484 507 5b34190-5b341bf 500->507 513 5b341fe-5b3420f 501->513 505 5b341ee 502->505 506 5b341ec 502->506 505->501 506->501 527 5b341c1-5b341ce 507->527 528 5b341d0-5b341de 507->528 513->477 513->478 539 5b34406-5b3441f 517->539 540 5b342f5-5b3430b 517->540 537 5b34445-5b34467 518->537 538 5b344ae-5b344b8 518->538 524 5b3404c-5b3405c 520->524 521->524 535 5b34077-5b34079 524->535 536 5b3405e-5b34075 524->536 527->528 528->477 541 5b340c2-5b340c4 535->541 542 5b3407b-5b34089 535->542 536->535 559 5b344b9-5b3450a call 5b344cb 537->559 560 5b34469-5b34485 537->560 539->517 539->518 540->539 557 5b34311-5b3435f 540->557 543 5b340d2-5b340e2 541->543 544 5b340c6-5b340d0 541->544 542->541 556 5b3408b-5b3409d 542->556 561 5b340e4-5b340f2 543->561 562 5b3410d-5b34113 call 5b34aff 543->562 544->543 558 5b3411b-5b34127 544->558 564 5b340a3-5b340a7 556->564 565 5b3409f-5b340a1 556->565 600 5b34361-5b34387 557->600 601 5b34389-5b343ad 557->601 558->513 575 5b3412d-5b34148 558->575 597 5b3452a-5b34568 559->597 598 5b3450c-5b34528 559->598 577 5b344a9-5b344ac 560->577 572 5b34105-5b34108 561->572 573 5b340f4-5b34103 561->573 569 5b34119 562->569 574 5b340ad-5b340bc 564->574 565->574 569->558 572->477 573->558 574->541 585 5b34239-5b3424c 574->585 575->477 577->538 578 5b34493-5b34496 577->578 578->559 584 5b34498-5b344a8 578->584 584->577 585->484 598->597 600->601 613 5b343df-5b343f8 601->613 614 5b343af-5b343c6 601->614 617 5b34403-5b34404 613->617 618 5b343fa 613->618 622 5b343d2-5b343dd 614->622 623 5b343c8-5b343cb 614->623 617->539 618->617 622->613 622->614 623->622
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q
                                                            • API String ID: 0-388095546
                                                            • Opcode ID: bb3c37a1ab24a836deab114d383bc5b412ba567ac239d60d9332c238b371be63
                                                            • Instruction ID: bb626df17dce3ec6ddd059a9abda45a7fd3e11304223964faf81cdef2620986b
                                                            • Opcode Fuzzy Hash: bb3c37a1ab24a836deab114d383bc5b412ba567ac239d60d9332c238b371be63
                                                            • Instruction Fuzzy Hash: D7126034B006158FCB14DF69C585AAEBBF2FF89710B1485A9D806EB365DB31EC42CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dbecc7d2e7f1b58c750af7d020814ab032e374f92f962ebc2bade43d8853688c
                                                            • Instruction ID: 743e4b9b0dd82a6baae2d4ddc75a7a3ed308752837538345a098a2558e69426d
                                                            • Opcode Fuzzy Hash: dbecc7d2e7f1b58c750af7d020814ab032e374f92f962ebc2bade43d8853688c
                                                            • Instruction Fuzzy Hash: 6102B530A00205AFDB15DF69D885BAEBBF2FF84310F1485A9E509EB261DB31ED45CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ec4b2bd692bce6abef1f3a7a1b773687c5a46ba0d11c18cc354b9f05d0a1bf3
                                                            • Instruction ID: 6c08911e3516910d98b52645435c6355042b126f64273f55f65fe832503f29af
                                                            • Opcode Fuzzy Hash: 5ec4b2bd692bce6abef1f3a7a1b773687c5a46ba0d11c18cc354b9f05d0a1bf3
                                                            • Instruction Fuzzy Hash: B6D10570910308CFCB15EFB4D845A9DBBB2FF8A301F5085A9E44AA7294DF355989CF11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 294 22bd0a8-22bd147 GetCurrentProcess 298 22bd149-22bd14f 294->298 299 22bd150-22bd184 GetCurrentThread 294->299 298->299 300 22bd18d-22bd1c1 GetCurrentProcess 299->300 301 22bd186-22bd18c 299->301 302 22bd1ca-22bd1e5 call 22bd289 300->302 303 22bd1c3-22bd1c9 300->303 301->300 307 22bd1eb-22bd21a GetCurrentThreadId 302->307 303->302 308 22bd21c-22bd222 307->308 309 22bd223-22bd285 307->309 308->309
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 022BD136
                                                            • GetCurrentThread.KERNEL32 ref: 022BD173
                                                            • GetCurrentProcess.KERNEL32 ref: 022BD1B0
                                                            • GetCurrentThreadId.KERNEL32 ref: 022BD209
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 2aff9f22eaa2b7b58b9a754b54b0b5556e6536d9d3a0a0ae670e44e42cb44b14
                                                            • Instruction ID: 67107bcdf3349cfd3bcda6c2e83e889158e8be9fa6e5516263008dda7db4a154
                                                            • Opcode Fuzzy Hash: 2aff9f22eaa2b7b58b9a754b54b0b5556e6536d9d3a0a0ae670e44e42cb44b14
                                                            • Instruction Fuzzy Hash: 9E5176B09103498FEB05DFA9D5487DEBBF1EF48304F208859E019AB3A0DB74A884CF65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 316 22bd0b8-22bd147 GetCurrentProcess 320 22bd149-22bd14f 316->320 321 22bd150-22bd184 GetCurrentThread 316->321 320->321 322 22bd18d-22bd1c1 GetCurrentProcess 321->322 323 22bd186-22bd18c 321->323 324 22bd1ca-22bd1e5 call 22bd289 322->324 325 22bd1c3-22bd1c9 322->325 323->322 329 22bd1eb-22bd21a GetCurrentThreadId 324->329 325->324 330 22bd21c-22bd222 329->330 331 22bd223-22bd285 329->331 330->331
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 022BD136
                                                            • GetCurrentThread.KERNEL32 ref: 022BD173
                                                            • GetCurrentProcess.KERNEL32 ref: 022BD1B0
                                                            • GetCurrentThreadId.KERNEL32 ref: 022BD209
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: fffb20a8e38d3d6413a3f8bce6ad71a9221aa49757b2cf55ad68b7741516b547
                                                            • Instruction ID: 5e80bfc7790e32292435dd06e3f3536e28719779f37b08e5108d7146c92f2fac
                                                            • Opcode Fuzzy Hash: fffb20a8e38d3d6413a3f8bce6ad71a9221aa49757b2cf55ad68b7741516b547
                                                            • Instruction Fuzzy Hash: 245155B09102498FEB05DFAAD548BDEBBF1EF48304F208459E419A73A0C774A984CF65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 360 5b33721-5b33731 call 5b3372b 364 5b33733-5b3373c 360->364 365 5b33757-5b33762 360->365 366 5b33764-5b33785 365->366 367 5b3378c-5b33790 365->367 366->367 368 5b33792-5b33794 367->368 369 5b3379c-5b337ab 367->369 368->369 370 5b337b7-5b337e3 369->370 371 5b337ad 369->371 375 5b33a04-5b33a4f 370->375 376 5b337e9-5b337ef 370->376 371->370 407 5b33a51 375->407 408 5b33a65-5b33a71 375->408 378 5b337f5-5b337fb 376->378 379 5b338b8-5b338bc 376->379 378->375 381 5b33801-5b33810 378->381 382 5b338e1-5b338ea 379->382 383 5b338be-5b338c7 379->383 384 5b33897-5b338a0 381->384 385 5b33816-5b33822 381->385 387 5b3390f-5b33912 382->387 388 5b338ec-5b3390c 382->388 383->375 386 5b338cd-5b338df 383->386 384->375 392 5b338a6-5b338b2 384->392 385->375 389 5b33828-5b3383f 385->389 390 5b33915-5b3391b 386->390 387->390 388->387 393 5b33841 389->393 394 5b3384b-5b3385d 389->394 390->375 396 5b33921-5b33936 390->396 392->378 392->379 393->394 394->384 402 5b3385f-5b33865 394->402 396->375 398 5b3393c-5b3394e 396->398 398->375 401 5b33954-5b33961 398->401 401->375 404 5b33967-5b3397e 401->404 405 5b33871-5b33877 402->405 406 5b33867 402->406 404->375 416 5b33984-5b3399c 404->416 405->375 410 5b3387d-5b33894 405->410 406->405 409 5b33a54-5b33a56 407->409 411 5b33a73 408->411 412 5b33a7d-5b33a99 408->412 414 5b33a9a-5b33aa0 409->414 415 5b33a58-5b33a63 409->415 411->412 423 5b33aa2-5b33ad7 call 5b33aab 414->423 424 5b33afa-5b33aff 414->424 415->408 415->409 416->375 417 5b3399e-5b339a9 416->417 419 5b339ab-5b339b5 417->419 420 5b339fa-5b33a01 417->420 419->420 429 5b339b7-5b339cd 419->429 444 5b33af3-5b33af8 423->444 445 5b33ad9-5b33adc 423->445 425 5b33b01 424->425 426 5b33b0b-5b33b30 424->426 425->426 437 5b33b32-5b33b38 426->437 438 5b33ba4-5b33baa 426->438 434 5b339d9-5b339f2 429->434 435 5b339cf 429->435 434->420 435->434 437->438 442 5b33b3a-5b33b3d 437->442 440 5b33bf7-5b33c11 438->440 441 5b33bac-5b33baf 438->441 446 5b33bb1-5b33bbe 441->446 447 5b33c14-5b33c39 441->447 442->447 448 5b33b43-5b33b50 442->448 444->424 449 5b33adf-5b33af1 445->449 450 5b33bf1-5b33bf5 446->450 451 5b33bc0-5b33bd8 446->451 463 5b33c47-5b33c4b 447->463 464 5b33c3b-5b33c41 447->464 453 5b33b52-5b33b7c 448->453 454 5b33b9e-5b33ba2 448->454 449->444 449->449 450->440 450->441 451->447 457 5b33bda-5b33bed 451->457 458 5b33b88-5b33b9b 453->458 459 5b33b7e 453->459 454->438 454->442 457->450 458->454 459->458 467 5b33c71-5b33c76 463->467 468 5b33c4d-5b33c5d 463->468 465 5b33c43 464->465 466 5b33c45 464->466 465->463 466->463 468->467 470 5b33c5f-5b33c70 468->470
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (bq$d
                                                            • API String ID: 0-3334038649
                                                            • Opcode ID: a70b64b5461c644874d93bf337a0d15e4e45ee5f01895ab9c1459f5a0bbc2242
                                                            • Instruction ID: 917e5328ca179fbe3e3e1918bc1580caa33c513585e4196693fb8758322594af
                                                            • Opcode Fuzzy Hash: a70b64b5461c644874d93bf337a0d15e4e45ee5f01895ab9c1459f5a0bbc2242
                                                            • Instruction Fuzzy Hash: 82026B746006018FD714DF19C48596AFBF2FF88324B25CAA9D46AAB765DB30FC46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 626 22bae30-22bae3f 627 22bae6b-22bae6f 626->627 628 22bae41-22bae4e call 22b9838 626->628 630 22bae83-22baec4 627->630 631 22bae71-22bae7b 627->631 634 22bae50 628->634 635 22bae64 628->635 637 22baed1-22baedf 630->637 638 22baec6-22baece 630->638 631->630 683 22bae56 call 22bb0b8 634->683 684 22bae56 call 22bb0c8 634->684 635->627 639 22baf03-22baf05 637->639 640 22baee1-22baee6 637->640 638->637 644 22baf08-22baf0f 639->644 642 22baee8-22baeef call 22ba814 640->642 643 22baef1 640->643 641 22bae5c-22bae5e 641->635 645 22bafa0-22bafb7 641->645 647 22baef3-22baf01 642->647 643->647 648 22baf1c-22baf23 644->648 649 22baf11-22baf19 644->649 659 22bafb9-22bb018 645->659 647->644 651 22baf30-22baf39 call 22ba824 648->651 652 22baf25-22baf2d 648->652 649->648 657 22baf3b-22baf43 651->657 658 22baf46-22baf4b 651->658 652->651 657->658 660 22baf69-22baf76 658->660 661 22baf4d-22baf54 658->661 677 22bb01a-22bb060 659->677 668 22baf99-22baf9f 660->668 669 22baf78-22baf96 660->669 661->660 662 22baf56-22baf66 call 22ba834 call 22ba844 661->662 662->660 669->668 678 22bb068-22bb093 GetModuleHandleW 677->678 679 22bb062-22bb065 677->679 680 22bb09c-22bb0b0 678->680 681 22bb095-22bb09b 678->681 679->678 681->680 683->641 684->641
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 022BB086
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 782dd1e1e92fa59e080fbad6fdbd609129f62c88b5e38c9cc73ff4d3f1ac9352
                                                            • Instruction ID: 584a7b5aaa47a0566f8fd42ff2aceee35cdf0e501209de06911e153b5d98f6af
                                                            • Opcode Fuzzy Hash: 782dd1e1e92fa59e080fbad6fdbd609129f62c88b5e38c9cc73ff4d3f1ac9352
                                                            • Instruction Fuzzy Hash: FB7134B0A10B058FDB25DFA9D04479ABBF1FF88344F00892DE48AD7A54DB75E849CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 685 22b4248-22b5a01 CreateActCtxA 688 22b5a0a-22b5a64 685->688 689 22b5a03-22b5a09 685->689 696 22b5a73-22b5a77 688->696 697 22b5a66-22b5a69 688->697 689->688 698 22b5a79-22b5a85 696->698 699 22b5a88 696->699 697->696 698->699 701 22b5a89 699->701 701->701
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 022B59F1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 1a422992cb319b9d15d2560dd4526cb39a887fb0ac6762299dae337c4b1610fb
                                                            • Instruction ID: 43093dce273f3dcfb36030f1cb2e60748f1f215ed62567e664946a7f2075c4bf
                                                            • Opcode Fuzzy Hash: 1a422992cb319b9d15d2560dd4526cb39a887fb0ac6762299dae337c4b1610fb
                                                            • Instruction Fuzzy Hash: 0141E0B0D10619CBEB24CFA9C884BCDBBB5FF49304F24806AD408BB255DBB56949CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 702 22b5935-22b593a 703 22b5944-22b5a01 CreateActCtxA 702->703 705 22b5a0a-22b5a64 703->705 706 22b5a03-22b5a09 703->706 713 22b5a73-22b5a77 705->713 714 22b5a66-22b5a69 705->714 706->705 715 22b5a79-22b5a85 713->715 716 22b5a88 713->716 714->713 715->716 718 22b5a89 716->718 718->718
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 022B59F1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 161c01ee9f971da4406994280aec7607771fff31ded8f5a4135f2b14b35e09fc
                                                            • Instruction ID: a2b8ce31a60f70cbfc80f4f9dbdec9ab7f02c17372e9402e714c68b8162e4228
                                                            • Opcode Fuzzy Hash: 161c01ee9f971da4406994280aec7607771fff31ded8f5a4135f2b14b35e09fc
                                                            • Instruction Fuzzy Hash: 8E41F1B0D00619CEEB24DFA9C8846CDBBF5BF49304F24806AD008BB255DBB96949CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 719 22bd300-22bd394 DuplicateHandle 720 22bd39d-22bd3ba 719->720 721 22bd396-22bd39c 719->721 721->720
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022BD387
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: ee5077966ec908cce0767fab8c49461e3bb5991ed19ff103e65f72a4fb15c09a
                                                            • Instruction ID: b2064c492aa2ad6c807f348b0a3c95f75677d38bdb8b484e2d1b94d10e254d9e
                                                            • Opcode Fuzzy Hash: ee5077966ec908cce0767fab8c49461e3bb5991ed19ff103e65f72a4fb15c09a
                                                            • Instruction Fuzzy Hash: 4821E4B59002489FDB10CF9AD984ADEBBF4FF48310F14841AE918A7310C378A940CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 724 22bd2f9-22bd394 DuplicateHandle 725 22bd39d-22bd3ba 724->725 726 22bd396-22bd39c 724->726 726->725
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022BD387
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: cc026b3d28db04864afa8021e0c1a9cbb59a22cab7f866dfbb6f3e29e7a82101
                                                            • Instruction ID: a5991cc2a3f885cb68573751ea80cbfddfbb9f971153570d7be9d522e19e0ee6
                                                            • Opcode Fuzzy Hash: cc026b3d28db04864afa8021e0c1a9cbb59a22cab7f866dfbb6f3e29e7a82101
                                                            • Instruction Fuzzy Hash: A021F3B5900209DFDB10CFAAE584ADEBBF5FF48314F14841AE958A7350D378A950CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 729 22ba870-22bb2e8 731 22bb2ea-22bb2ed 729->731 732 22bb2f0-22bb31f LoadLibraryExW 729->732 731->732 733 22bb328-22bb345 732->733 734 22bb321-22bb327 732->734 734->733
                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022BB101,00000800,00000000,00000000), ref: 022BB312
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 87c42c81e97a60336e1c50494c0fde44655b396238f93cfeab69511b3482bd0e
                                                            • Instruction ID: a89ab043c3b09a7445377eb825f1b1f8fc49daf95402ad49238a18d33bafa09a
                                                            • Opcode Fuzzy Hash: 87c42c81e97a60336e1c50494c0fde44655b396238f93cfeab69511b3482bd0e
                                                            • Instruction Fuzzy Hash: 3B1112B6D003499FDB10CF9AC444ADEFBF4EF48314F10842AE919AB214C3B5A544CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 737 22bb2a0-22bb2e8 738 22bb2ea-22bb2ed 737->738 739 22bb2f0-22bb31f LoadLibraryExW 737->739 738->739 740 22bb328-22bb345 739->740 741 22bb321-22bb327 739->741 741->740
                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022BB101,00000800,00000000,00000000), ref: 022BB312
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: c9d4ec7b089ebdbab2a9e122a605d67007b6621fe6e02d407369c49a81efba08
                                                            • Instruction ID: dc233dcd9274c9bb60b511388c750e5c630d93810a6cffe9a20e2afeeda03345
                                                            • Opcode Fuzzy Hash: c9d4ec7b089ebdbab2a9e122a605d67007b6621fe6e02d407369c49a81efba08
                                                            • Instruction Fuzzy Hash: 5F1112B6D003498FDB14CFAAD544ADEFBF4EF48314F10842AD859AB210C374A544CFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 744 22bb020-22bb060 745 22bb068-22bb093 GetModuleHandleW 744->745 746 22bb062-22bb065 744->746 747 22bb09c-22bb0b0 745->747 748 22bb095-22bb09b 745->748 746->745 748->747
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 022BB086
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: e2304848ca2a5ec8b6bca87a437c102e0b12a796331e877122db45be1d147821
                                                            • Instruction ID: 1315f519b892932e06e0c70418899f92a6bbbc3c660464d74ddcdd19a50a4b23
                                                            • Opcode Fuzzy Hash: e2304848ca2a5ec8b6bca87a437c102e0b12a796331e877122db45be1d147821
                                                            • Instruction Fuzzy Hash: F111D2B5D003498FDB10DF9AD444ADEFBF4AF48314F10845AD869B7214C375A545CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 750 5b359d8-5b359f3 751 5b359f5-5b359f7 750->751 752 5b359ff-5b35a0e 750->752 751->752 753 5b35a10 752->753 754 5b35a1a-5b35a2a 752->754 753->754 755 5b35a2d-5b35a4f 754->755 756 5b35a55-5b35a5b 755->756 757 5b35c88-5b35ccf 755->757 758 5b35a61-5b35a67 756->758 759 5b35b34-5b35b38 756->759 785 5b35cd1 757->785 786 5b35ce5-5b35cf1 757->786 758->757 760 5b35a6d-5b35a7a 758->760 761 5b35b5b-5b35b64 759->761 762 5b35b3a-5b35b43 759->762 764 5b35b13-5b35b1c 760->764 765 5b35a80-5b35a89 760->765 767 5b35b66-5b35b86 761->767 768 5b35b89-5b35b8c 761->768 762->757 766 5b35b49-5b35b59 762->766 764->757 769 5b35b22-5b35b2e 764->769 765->757 770 5b35a8f-5b35ab0 765->770 771 5b35b8f-5b35b95 766->771 767->768 768->771 769->758 769->759 773 5b35ab2 770->773 774 5b35abc-5b35ad7 770->774 771->757 776 5b35b9b-5b35bae 771->776 773->774 774->764 782 5b35ad9-5b35adf 774->782 776->757 777 5b35bb4-5b35bc4 776->777 777->757 781 5b35bca-5b35bd7 777->781 781->757 783 5b35bdd-5b35c02 781->783 787 5b35ae1 782->787 788 5b35aeb-5b35af1 782->788 783->757 799 5b35c08-5b35c20 783->799 790 5b35cd4-5b35cd6 785->790 791 5b35cf3 786->791 792 5b35cfd-5b35d19 786->792 787->788 788->757 793 5b35af7-5b35b10 788->793 794 5b35d1a-5b35d36 790->794 795 5b35cd8-5b35ce3 790->795 791->792 795->786 795->790 799->757 804 5b35c22-5b35c2d 799->804 805 5b35c2f-5b35c39 804->805 806 5b35c7e-5b35c85 804->806 805->806 808 5b35c3b-5b35c51 805->808 810 5b35c53 808->810 811 5b35c5d-5b35c76 808->811 810->811 811->806
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: d
                                                            • API String ID: 0-2564639436
                                                            • Opcode ID: 1195f892aa018b7a90fbb89a7c9ca58e8be8f72253f106e4786d0df58199dc90
                                                            • Instruction ID: 97f397a6c0aca6be8f83295bcec9b86f9d0710d872d3a98de5d64065d99a2a6b
                                                            • Opcode Fuzzy Hash: 1195f892aa018b7a90fbb89a7c9ca58e8be8f72253f106e4786d0df58199dc90
                                                            • Instruction Fuzzy Hash: 24C16E34600602DFCB25CF19C580D6ABBF2FF8931476AC999D45A9B6A5D730FC46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q
                                                            • API String ID: 0-2625958711
                                                            • Opcode ID: 043382c633ffea3e88a4f892876d93ca40a7cb8cfb222dde722407857e6dba04
                                                            • Instruction ID: 5a73e716c9e1d43c2f704db9c26eae483e16442e5279c8567b7a6ebbf6ed97d5
                                                            • Opcode Fuzzy Hash: 043382c633ffea3e88a4f892876d93ca40a7cb8cfb222dde722407857e6dba04
                                                            • Instruction Fuzzy Hash: D0416974E01218DFCB48DFA9D480AEEBBB2FF88315F10906AE415A7264DB75A946CF41
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q
                                                            • API String ID: 0-1614139903
                                                            • Opcode ID: a48aab4e1f68ca1d5a4f73854d912f1d8a789dfa800f8f36a72a33d388c7bad3
                                                            • Instruction ID: e590b2bc0266e4de1e92a6a82e1e38d7ebf62d0e93ea29b0b0e6dcfa45c501d3
                                                            • Opcode Fuzzy Hash: a48aab4e1f68ca1d5a4f73854d912f1d8a789dfa800f8f36a72a33d388c7bad3
                                                            • Instruction Fuzzy Hash: 5F3190317002198FCB09EB79A5695BE7BE7EFC8204B504439E50ADB385EF35AD0687E1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q
                                                            • API String ID: 0-1614139903
                                                            • Opcode ID: e4248c7fbeeb8d6560e9a05466e3a219abb84c4523ad7dc5aca6324981677007
                                                            • Instruction ID: 0d39eeeb7c8587bc16d55e3ea32c34ccba9d51482571e909219f8392262caa61
                                                            • Opcode Fuzzy Hash: e4248c7fbeeb8d6560e9a05466e3a219abb84c4523ad7dc5aca6324981677007
                                                            • Instruction Fuzzy Hash: 572147317002508FC716B778945456EBBE6EFC635131448BED00A8B395DE35EC0B83E2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q
                                                            • API String ID: 0-1614139903
                                                            • Opcode ID: 909c03df147e3d17ca2804b1ba8ca17665b13a1ea69a192266f27bca0c311431
                                                            • Instruction ID: 7c13ffa708980397b561eb729b0fa887ea7b870148519f6c9a5ff7f263af7fb0
                                                            • Opcode Fuzzy Hash: 909c03df147e3d17ca2804b1ba8ca17665b13a1ea69a192266f27bca0c311431
                                                            • Instruction Fuzzy Hash: 05019A74901349EFCB05EFB8E99468DBFB2FF85300B1848A9D48597355EB305A48CB11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q
                                                            • API String ID: 0-1614139903
                                                            • Opcode ID: d9403c458cdb2ffdf35584250aa4fa286d439e60e0efcaee660ae5136466827b
                                                            • Instruction ID: dbaa09b3e86efc767e19b7284aaed2eac5e4bf53c09062876658a1207777b08d
                                                            • Opcode Fuzzy Hash: d9403c458cdb2ffdf35584250aa4fa286d439e60e0efcaee660ae5136466827b
                                                            • Instruction Fuzzy Hash: B4F096327401014FC619FB39E49596EBBE7EBC92513548929D45A8B358EF20FD4F43A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q
                                                            • API String ID: 0-1614139903
                                                            • Opcode ID: 27296872e145d142d5f043d306958d56fab3713b4abc16c43023fe5c72a3de93
                                                            • Instruction ID: 0b05e8b386044d2f026578ed920fe5b128c4878951256e15fcd6484ba9464bd7
                                                            • Opcode Fuzzy Hash: 27296872e145d142d5f043d306958d56fab3713b4abc16c43023fe5c72a3de93
                                                            • Instruction Fuzzy Hash: 2AF090313402054FC619FB39E49596EBBE7EBC92513508929D00A8B368EF20FD4E83A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'^q
                                                            • API String ID: 0-1614139903
                                                            • Opcode ID: 0b2bc973a5e7c86e930be58ea5a1712a0c8a579d3188c97814b4e0b71289d28f
                                                            • Instruction ID: c1ef7dc6de41696c5a19afeebb6652947fa6e88b0eb01f61899abe3e3f82a1c7
                                                            • Opcode Fuzzy Hash: 0b2bc973a5e7c86e930be58ea5a1712a0c8a579d3188c97814b4e0b71289d28f
                                                            • Instruction Fuzzy Hash: 83F08C74A41308EFCB08EFB8E59465DBBB2FB84300F1085A8D80697354DF301A48CB41
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea6f7dff9c663a9fa7fb57ac39c029fb8112f995dfb5e4a83d58e47aa545e1c6
                                                            • Instruction ID: 62bb20b05e4bc7b899e706c483c3867753ccab9720abbce3d026c59a40790a62
                                                            • Opcode Fuzzy Hash: ea6f7dff9c663a9fa7fb57ac39c029fb8112f995dfb5e4a83d58e47aa545e1c6
                                                            • Instruction Fuzzy Hash: 08C169347006058FCB14DF79C488AAABBF2FF88311B1585A9E546DB3A6DB30EC45CB60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a5461a71ec0eab205d2f926c89f912aeab044df750a3bb3d6d7a130f6e69d557
                                                            • Instruction ID: aafdbef777698bf7415c514ca1d28e4a9a932e49eec9983c991d16855c04b818
                                                            • Opcode Fuzzy Hash: a5461a71ec0eab205d2f926c89f912aeab044df750a3bb3d6d7a130f6e69d557
                                                            • Instruction Fuzzy Hash: C25124B1E002589BDB14CFA9D885B9EBBB6FF48304F148469E419BB244DB74A946CF80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7e18f6d9c06a8aa0846e31c905aa343717646f694c76e4d274d3c3e93717b38a
                                                            • Instruction ID: 66e4dfa291f1fce997e5c575b91a41d2572bf548a250eb3fce0f63cc19a8feff
                                                            • Opcode Fuzzy Hash: 7e18f6d9c06a8aa0846e31c905aa343717646f694c76e4d274d3c3e93717b38a
                                                            • Instruction Fuzzy Hash: BD5126B0E002589BDB14CFA9C885BDEBBF6FF48304F148529E415BB294DB74A946CF81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a6213a2f6b79d9f877f8dcf9b327ede99c4311ecdb8c9c7f1b8e5d9bdeddc668
                                                            • Instruction ID: d5422593b6b54fef4df0684c2f221ca83ddbc24802221e8b6792226e5a92a87b
                                                            • Opcode Fuzzy Hash: a6213a2f6b79d9f877f8dcf9b327ede99c4311ecdb8c9c7f1b8e5d9bdeddc668
                                                            • Instruction Fuzzy Hash: FE415B35600605DFCB20CF59C884DAAFBF2FF89314B15C999E559AB2A1D730F905CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9879a9fcfa60d54bdef98e03710f04608ff25670a2f459164a513801e0689b0f
                                                            • Instruction ID: aa456f13455afc378a2d536337c24167be61b2e31275dea0445b49317e252971
                                                            • Opcode Fuzzy Hash: 9879a9fcfa60d54bdef98e03710f04608ff25670a2f459164a513801e0689b0f
                                                            • Instruction Fuzzy Hash: 2E410235A043448FCB06DF78C815A6A7FB6FF86300B1985DAD480DB3A2EA34DD05CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 31362df30d6429d4c84655cdbfd9a7755dc3874710587d334efe2d410589b1bc
                                                            • Instruction ID: cd14486fb984fb2610751eef02fbf9c52790f09f8f8d6ebf78a7264826e636c0
                                                            • Opcode Fuzzy Hash: 31362df30d6429d4c84655cdbfd9a7755dc3874710587d334efe2d410589b1bc
                                                            • Instruction Fuzzy Hash: C031AF357002109FCB15EF39D4849AEBBB2FF89311B0085A9E806DB3A9DB34ED05CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06734105686dc7eea65ce100c12cfdb284f43cf91243bbddbf672e669aa2074b
                                                            • Instruction ID: 33d69fffa722a74f6920c2c45baee018b1c169184cccec2e86e95ebb3cf6a5dc
                                                            • Opcode Fuzzy Hash: 06734105686dc7eea65ce100c12cfdb284f43cf91243bbddbf672e669aa2074b
                                                            • Instruction Fuzzy Hash: D231A035701210AFCB15DF35D4849AEBBB2FF89311B1084A9E806DB369DB35ED06CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 533d921e37350b74442a5c2697acea8b2617991ac63440ad11f82017f498612b
                                                            • Instruction ID: 9268ad13ec636d6ceff2592a30b15778a2b822f39dc9f6f1e50aca375abd60fd
                                                            • Opcode Fuzzy Hash: 533d921e37350b74442a5c2697acea8b2617991ac63440ad11f82017f498612b
                                                            • Instruction Fuzzy Hash: DC3180357012109FCB15DF39D48496EBBB2FF89311B5084A9E906DB369DB35ED05CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9a44890b56eea0748b666d777a2849066f9cbb568632226736af028f8872414
                                                            • Instruction ID: 2768edeb6e73e74993159dfd7779eb006221b62b41b6bce58d526bc5ad9e5c18
                                                            • Opcode Fuzzy Hash: b9a44890b56eea0748b666d777a2849066f9cbb568632226736af028f8872414
                                                            • Instruction Fuzzy Hash: 4B41F0B1D01248DFDB14DFAAD945AEEFBF6AF88310F10802AE419B7254DB34A945CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3f4f25d2d49d1f207f928cb5c529a299c431b0750243aef4dcf847b201c40ee7
                                                            • Instruction ID: 47dd47d6de5af3a37a3c8f239caea5e452f5578b9827ab3c55507ea6d56c353a
                                                            • Opcode Fuzzy Hash: 3f4f25d2d49d1f207f928cb5c529a299c431b0750243aef4dcf847b201c40ee7
                                                            • Instruction Fuzzy Hash: 953113B1D012489BDB14DFAAD945BDEBFF6AF48300F10802AE405B7250DB34A946CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89ff8fbd4bbaddf6d8858503ca16fba8c368c01988af47d56e8c6263d86f9278
                                                            • Instruction ID: c0b25f524b8ae5a734b09625f8693b7682119265d381b2e665af3df56b4bd21b
                                                            • Opcode Fuzzy Hash: 89ff8fbd4bbaddf6d8858503ca16fba8c368c01988af47d56e8c6263d86f9278
                                                            • Instruction Fuzzy Hash: 423103B1D01259DFCB14CFA9D895BDEBBB9EF48310F24846AE409B7240DB75A842CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922661645.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_95d000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d4d20d6b2e6210944d8c1b007b071bee3874d8d86e944b21c5a01dd262108183
                                                            • Instruction ID: 715c8a6f779e2d5eb389b8f7d5d84ab78c6faa4f4e059c69a7107e00bf626c58
                                                            • Opcode Fuzzy Hash: d4d20d6b2e6210944d8c1b007b071bee3874d8d86e944b21c5a01dd262108183
                                                            • Instruction Fuzzy Hash: FD213A71500204DFDB15DF15D9C0B26BF69FB94315F20C569DD094F2A6C33AE85AC7A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922710631.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_96d000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37c319060913a7df879c2184356c5d57a782bbfc98279b0e42757902444e00b4
                                                            • Instruction ID: bee8a7eef39750778e0e68b437a53049fd46eb7950d30e9f8ead4dacc1c9d91f
                                                            • Opcode Fuzzy Hash: 37c319060913a7df879c2184356c5d57a782bbfc98279b0e42757902444e00b4
                                                            • Instruction Fuzzy Hash: 33210475A04240DFDB14DF14D9C4B26BFA9FB88314F24C96DE81A4B296C33BD847CAA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec864b33fd7f5743c6d9a892d7c31b9e93e441ca566b8a2fac72c2ea52a3bd76
                                                            • Instruction ID: 32c7a12ecf043ea7a69fd38e3aa86c7e033ec1bc04c72808385bc632e22026d2
                                                            • Opcode Fuzzy Hash: ec864b33fd7f5743c6d9a892d7c31b9e93e441ca566b8a2fac72c2ea52a3bd76
                                                            • Instruction Fuzzy Hash: B111C4331453A04FC312EB3CEDA57DB7FE6CF82254B0801ABD0C6CA263D665994A8796
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 006c22833af189c9439eea1e9daf98f41f8b0c34cd7d4d7df0447de90a523f81
                                                            • Instruction ID: 3860841c4c5dfc6129525355289a3e94699a981fb4b98d868fb9d48aad60dc91
                                                            • Opcode Fuzzy Hash: 006c22833af189c9439eea1e9daf98f41f8b0c34cd7d4d7df0447de90a523f81
                                                            • Instruction Fuzzy Hash: 7C2126B1D01349DFDB14CFA9C895BDEBBF9AF48310F148429E405B7290DB75A842CB95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922710631.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_96d000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2bb6adb97a9833e5b680fa73ab8f8c55c3f2515400a10d65a782b70c07f27dfc
                                                            • Instruction ID: e0a0df9807eeba5b961e92576d0af33683925a428db141637dda9c16d2ef58f3
                                                            • Opcode Fuzzy Hash: 2bb6adb97a9833e5b680fa73ab8f8c55c3f2515400a10d65a782b70c07f27dfc
                                                            • Instruction Fuzzy Hash: 99215E755093808FDB12CF24D994B15BF71EB46314F28C5EAD8498F6A7C33A980ACB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ccaf9bcaff5ab55e2497139bf513d578edcad3abede0f1a29934f06de9f49229
                                                            • Instruction ID: cbd7bd0ade691bc0d9757c190446b6d40eb994c786f98561d5618a9df6edc498
                                                            • Opcode Fuzzy Hash: ccaf9bcaff5ab55e2497139bf513d578edcad3abede0f1a29934f06de9f49229
                                                            • Instruction Fuzzy Hash: 8701D8A36081D43FDB124EAA5C518FA3FA8DA9E1717094197FAD4C1182D418C916D7B1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 762889c49cf0497d6e409e8d9a4777f9753782a72997caedcc08d83935fe46a3
                                                            • Instruction ID: e5573f27a2db6f29f0bebaa23dc029ff167bdf66e9d8a0eb315399353348a80e
                                                            • Opcode Fuzzy Hash: 762889c49cf0497d6e409e8d9a4777f9753782a72997caedcc08d83935fe46a3
                                                            • Instruction Fuzzy Hash: 6721E474E062189FCB08DFA9E8446DDBBF6FF88310F10902AE805B3360DB742945CB54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922661645.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_95d000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction ID: 71c9f14c08fefb632ecbadb9daf1546b8868ddb37a361d36aff27b5658f12bc1
                                                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction Fuzzy Hash: 18110372404240CFDB16CF00D5C4B16BF72FB94324F24C2A9DC090B266C33AE85ACBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce75e398612c6791c985f848e601d516cf17516823d3997e598a72d85b129800
                                                            • Instruction ID: b58180780d55cdf34045c4d9e457a86e6a5d372983e119a5533c0aa1583e4e35
                                                            • Opcode Fuzzy Hash: ce75e398612c6791c985f848e601d516cf17516823d3997e598a72d85b129800
                                                            • Instruction Fuzzy Hash: 531104312403058FC78AE738E9A566FBBA3EFC13453158828E947C7B55DE34AE4E8791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 352104f4adcc5c26ae93b665ffd65faa3061a7e8b1a5b2f6a6638514241b55a7
                                                            • Instruction ID: b5bfee520c2fdb5413abc787a55c47bffc422a88da72257d6d7077209f896be1
                                                            • Opcode Fuzzy Hash: 352104f4adcc5c26ae93b665ffd65faa3061a7e8b1a5b2f6a6638514241b55a7
                                                            • Instruction Fuzzy Hash: E401D6A22081D43FDB124EAA5C508FB3FA8DA8E1717094196FAE8C1182D418CA1697B1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d92fee3857601df66739d2b06f96e78e99dd41da7d6e23f4a9d86b4af0edd3c6
                                                            • Instruction ID: afd9299c0d05f7ed2dc70148862397eee7d4b6829741cae631cfaa9d75fc421a
                                                            • Opcode Fuzzy Hash: d92fee3857601df66739d2b06f96e78e99dd41da7d6e23f4a9d86b4af0edd3c6
                                                            • Instruction Fuzzy Hash: 6F017172B001199FDF10DEA9AC45ABFBBBAEBC8651B148036F505D3240DB31A91587A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fa44c0688d9e2d4c1444cbc0b264f4253b89365eaf0aed57bcadb1d1d22dea3d
                                                            • Instruction ID: 3e980c56ca6ae35414c20ccf2c65716e33427e5ecb5f14dba2b2b99f3734225c
                                                            • Opcode Fuzzy Hash: fa44c0688d9e2d4c1444cbc0b264f4253b89365eaf0aed57bcadb1d1d22dea3d
                                                            • Instruction Fuzzy Hash: 1011AC312443008FC329EF65E49461E7BE3EFC5311B108A6AD44687B95DB78A90A8B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a4fa7c1af262043c29d3e357c180d0dfe2deccbc4fdf4b82136ea974ab7cb156
                                                            • Instruction ID: 826c499dfb54a5abfda8c7ffb791b6637b61bea46ce77a6f5348e06276cfe804
                                                            • Opcode Fuzzy Hash: a4fa7c1af262043c29d3e357c180d0dfe2deccbc4fdf4b82136ea974ab7cb156
                                                            • Instruction Fuzzy Hash: 4301B1312803054F8789B739E55862FBBA3EFC13913458828E90787754DE74BE8E8795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 83708f85b61e45c0b4a78fad17eb78a0b541cd2f538d7b2779581a3f3be2169e
                                                            • Instruction ID: d381153c6faebd6724f3ceb851b3455fb72ea53017799f3a18e258642b23bf5b
                                                            • Opcode Fuzzy Hash: 83708f85b61e45c0b4a78fad17eb78a0b541cd2f538d7b2779581a3f3be2169e
                                                            • Instruction Fuzzy Hash: 6601AD30645302CFC739CA2AA501B27B7F3FF84215B1588ACD00392698DB75F880CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d290b6f7d33662c80e2431e250c83a0d4d0f1783bf4cb7cacedc11659d20a50
                                                            • Instruction ID: f9b46edcfe441b55cd51d0cf9257d03b5058173324e16285f8dc6762e78c3292
                                                            • Opcode Fuzzy Hash: 7d290b6f7d33662c80e2431e250c83a0d4d0f1783bf4cb7cacedc11659d20a50
                                                            • Instruction Fuzzy Hash: 8801CC312003048FC329AF35E04862BBBE3EFC4302F508A28D50A87785DF78AD0A8B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922661645.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_95d000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c532cc0eb4104bde2db108d07f0d9d21f1d90a8a914c2548c847170815bd2d09
                                                            • Instruction ID: 853223f88f3ddd14fbabbb4d9939bc16dcbcdd1768da5bd2580a304798d53225
                                                            • Opcode Fuzzy Hash: c532cc0eb4104bde2db108d07f0d9d21f1d90a8a914c2548c847170815bd2d09
                                                            • Instruction Fuzzy Hash: 7AF0E776201604AF9720CF0AD884C27FBADFFD4775719C55AE84A4B616C671EC42CFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8dccf0152cc09c89cdd58628997a19796bbebf27c4f968e30b020351f183bbee
                                                            • Instruction ID: 139e1b5f6b625f11b46358461c50d97ec944b918c8f6dd47f59527f548291f08
                                                            • Opcode Fuzzy Hash: 8dccf0152cc09c89cdd58628997a19796bbebf27c4f968e30b020351f183bbee
                                                            • Instruction Fuzzy Hash: B1F0F673949384EFC717CB24EC92A9A7FBA9F42200B1945D7E444CB292F6385F168B61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8dd21eebfd542ec9dbbcb1f6d3232417e5afdc936339f08613161d77aed54d7e
                                                            • Instruction ID: 97092a33398e7f6bad7352c5bd65a124c339b19c8a6ab58f761c993daa38e595
                                                            • Opcode Fuzzy Hash: 8dd21eebfd542ec9dbbcb1f6d3232417e5afdc936339f08613161d77aed54d7e
                                                            • Instruction Fuzzy Hash: 0F01D6B4D0521ADFCB44DFA9D9456AEBBF1FB48301F1084A9E415B3351E7781A40CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 570984ee705b0d27a6bb73606cb915ab2b34f36f2c7cdc7c6168f77b374e6e2d
                                                            • Instruction ID: 57dd2750aaf0155d6f2db3517dee9f94ea671c669d5689fcb518ede1c21dc619
                                                            • Opcode Fuzzy Hash: 570984ee705b0d27a6bb73606cb915ab2b34f36f2c7cdc7c6168f77b374e6e2d
                                                            • Instruction Fuzzy Hash: DB0112B4D0521ADFCB04DFA8D9456AEBFB1FB09301F2089AAE415B3341D7381A40CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922661645.000000000095D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0095D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_95d000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: deb09cbade00e46f7822981e5a3246d4b813cf683cfd63a75853f86434fa02bd
                                                            • Instruction ID: 4d43d8b3096802f839379529c74d71f8069a3bd7db61fd0e424a3d565b6ee551
                                                            • Opcode Fuzzy Hash: deb09cbade00e46f7822981e5a3246d4b813cf683cfd63a75853f86434fa02bd
                                                            • Instruction Fuzzy Hash: 63F03C75105680AFD725CF06C884C22BFB9FF857607198489E88A4B352C635FC42CF60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a5391515c10066ed688e5c3d30c8e87c6c033f78a2fe0e6c43bba9b5812a3bd3
                                                            • Instruction ID: 114db768db68f7049c8a6d9987dc037feba38b83d2c9b69ac6b7ea6a081fc92a
                                                            • Opcode Fuzzy Hash: a5391515c10066ed688e5c3d30c8e87c6c033f78a2fe0e6c43bba9b5812a3bd3
                                                            • Instruction Fuzzy Hash: 90F02430504702CFCB31CE25D441ABBBBB3FF80224B058AACD042469D5D775F886CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db4603893e6351205b3fba992b112e836e70589568760c503ff0f75f3e2bf4dd
                                                            • Instruction ID: 0c906dedcb5c6a0beeb28f1ca6d56d3a19c478c117fa56241c26593a4a7c1b0b
                                                            • Opcode Fuzzy Hash: db4603893e6351205b3fba992b112e836e70589568760c503ff0f75f3e2bf4dd
                                                            • Instruction Fuzzy Hash: 39F027762043105FC3126B79E89579EBFE9EFCA342B04496DF08AC7642CA2858098762
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0b590cf9a8af929c1c1325dc0992c0bdaf6aa3c07a32f2121893bf00b7bb5346
                                                            • Instruction ID: e1a27b1554360cf74ba746064f12eb32ecb9c7a7923ef835ffa16f7d3f97aa68
                                                            • Opcode Fuzzy Hash: 0b590cf9a8af929c1c1325dc0992c0bdaf6aa3c07a32f2121893bf00b7bb5346
                                                            • Instruction Fuzzy Hash: 7CF012622041E83F8B518EAB5C10DFB7FEDDB8E162B084196FF98D2141C429C921ABB0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 39cb07e9526e36f89d3758792688e9ddae5c2b4e8a813b82945ab3be8b45092d
                                                            • Instruction ID: cbbefa9541d33493fb0960373a133ff386e18eaf20f31abc35edc59c5ba5f987
                                                            • Opcode Fuzzy Hash: 39cb07e9526e36f89d3758792688e9ddae5c2b4e8a813b82945ab3be8b45092d
                                                            • Instruction Fuzzy Hash: 44F09031744300AFD7219A28AC41FA57FE5EB85721F158266E264CF1E1D7A1E8458740
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1c9d1ce45f565d9a466f23c71367c060bb23fd5f02b75eb110a23ce90d215b70
                                                            • Instruction ID: 04e639d91d5464bbe8bcc07ed3c808833e5b54738b05a819fce7cffdcd14de6a
                                                            • Opcode Fuzzy Hash: 1c9d1ce45f565d9a466f23c71367c060bb23fd5f02b75eb110a23ce90d215b70
                                                            • Instruction Fuzzy Hash: 3501D176501B00CFD326DF61E489262BFF2FF483017008A1AD48AC3614DB38A50ACF80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 491790d112e2de47389c3c95648c01c35ba09b51878139c3fd3128fd79081a6f
                                                            • Instruction ID: 03c84594963fda930d1b6cebc48f9b40037b2966d3bef454b435b7fec7f65939
                                                            • Opcode Fuzzy Hash: 491790d112e2de47389c3c95648c01c35ba09b51878139c3fd3128fd79081a6f
                                                            • Instruction Fuzzy Hash: 26015AB4D0925ADBCB04CFA4E5456ADBBB1FB09300F20459DF411B7392D7741A40CB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 16afda10173eff8590de5ab0e00a158ed30516418ca6073cfc66121e7697ccd7
                                                            • Instruction ID: e86a218104ea70c83bfad33435af0ecf5c5922634d5a9720ad27548c152df0d3
                                                            • Opcode Fuzzy Hash: 16afda10173eff8590de5ab0e00a158ed30516418ca6073cfc66121e7697ccd7
                                                            • Instruction Fuzzy Hash: 5BF097F63482644FC30317346C1B0BC3F60DCC624238880EBE0C2DB296CE58950BC392
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ef7fe601604b202ec63698ccbadde9be77a5f399c403f352144750fd2e3a8564
                                                            • Instruction ID: 474964684bc3e780eb825da74630941943b68373c36e4b73d81198e51f91288b
                                                            • Opcode Fuzzy Hash: ef7fe601604b202ec63698ccbadde9be77a5f399c403f352144750fd2e3a8564
                                                            • Instruction Fuzzy Hash: 28F0A9B5C091599FCB01CFA4D8561ADBFB1EB5A201F0045D6F402E7352E638AA01CB01
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f0ae6810c4e62eb17569144aa10430c34a6c33596346d5547834a84cea758c3
                                                            • Instruction ID: 5539bb06b1b68988cce9799e89a0c96311535b952dc66f1d57a1be0892b28e7a
                                                            • Opcode Fuzzy Hash: 0f0ae6810c4e62eb17569144aa10430c34a6c33596346d5547834a84cea758c3
                                                            • Instruction Fuzzy Hash: 0CF0EC72B141154B8F109EBABC455BF7BB9FB981707080177F924D3280FF34990683A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5a5ef1a2c918d45ba434672a5f57c49f453f3f6b216dc43e59bd62b58a8b04d5
                                                            • Instruction ID: a8668462e575383d12ca5f4b05825a04c66c695462a10e3878b87d93df044400
                                                            • Opcode Fuzzy Hash: 5a5ef1a2c918d45ba434672a5f57c49f453f3f6b216dc43e59bd62b58a8b04d5
                                                            • Instruction Fuzzy Hash: 23E092752002186FC3156A6AA489A9FBBEAEBC9351B40842CF10EC3642CE69580987A6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f321ea1cfc333a54bd3ffc1b19617c3907ce564242613af78861a1101660f3bc
                                                            • Instruction ID: bc08fabb6fbe4c2982435b1e4ca26f8d4a084692ed704822b19e9fe598811ec7
                                                            • Opcode Fuzzy Hash: f321ea1cfc333a54bd3ffc1b19617c3907ce564242613af78861a1101660f3bc
                                                            • Instruction Fuzzy Hash: 89F0E5B62582F80FC3035B3869360ED3F25DEC611234940EBE0C6CB293CD580A0ACB96
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9394e4cd8dc6c5d1c3d3bc82eacb8a3f0522521c7fdca240061fbecbf960d720
                                                            • Instruction ID: 3480a7c4db54d796cad66c6f38b75871f43f64aa7b51638336760cb3f12af312
                                                            • Opcode Fuzzy Hash: 9394e4cd8dc6c5d1c3d3bc82eacb8a3f0522521c7fdca240061fbecbf960d720
                                                            • Instruction Fuzzy Hash: D3F06D75501B058FD729DF26E448563BBF6FF88301B008A2AE48B82A14DB74A509CFC4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cc96f3fe0a16bd5e64718105a8e1b9a6d4e40a277a7f840aa88e8f00be0e5e91
                                                            • Instruction ID: f2705e4afa3b6aea029e5069db327294821ba544a75a6fb506e1b545c9c535ad
                                                            • Opcode Fuzzy Hash: cc96f3fe0a16bd5e64718105a8e1b9a6d4e40a277a7f840aa88e8f00be0e5e91
                                                            • Instruction Fuzzy Hash: C7E092B210C2509FD340DB35E80489B7BE8EF95220F018CBEE445C7141E731EC41CB65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c1e64e8c36657691fc45727863f0259caaebe8b41cf204f194582b3d938f394
                                                            • Instruction ID: 0a36cf915d7cffd0bc205b1e20b27e0c629a64d756b125778a66061c2eae4189
                                                            • Opcode Fuzzy Hash: 8c1e64e8c36657691fc45727863f0259caaebe8b41cf204f194582b3d938f394
                                                            • Instruction Fuzzy Hash: 2DE0A9302407548FC325E72DE4087AFBFEADF81318F04056AE2468B742CBA5AC098B92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 45f8dfc270be6920ca4ed0f0af897cb13a1288ff9ef25e5334097342a8f75c7f
                                                            • Instruction ID: 9fe30f5be3fb848ff66951e94360d64c76eeded718eb78112993f0f30b85348e
                                                            • Opcode Fuzzy Hash: 45f8dfc270be6920ca4ed0f0af897cb13a1288ff9ef25e5334097342a8f75c7f
                                                            • Instruction Fuzzy Hash: 24E0D8322017408FC722EF28F891BDA7BA5EF41350F038059D080CF795D67059458FD1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 11432ce8e9921299bbc7e74d584e6571f03f7adef52ab3d543cc7028d640d703
                                                            • Instruction ID: f070e24fcd5618bb6612cb6b5daf51993fe68c2f65dbce56e44ac23e864d73fa
                                                            • Opcode Fuzzy Hash: 11432ce8e9921299bbc7e74d584e6571f03f7adef52ab3d543cc7028d640d703
                                                            • Instruction Fuzzy Hash: 4EE0D8711053449FC753E730E483A593FA5DF4130070AC089D885DF796D660AD0A8B81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 97ef8735e73c33f2e8208c73b1fd5cb49a9b4a57e13c67707e8f6e2f4d6dd491
                                                            • Instruction ID: 6f4d0cbf22728e8b2dcb5351b63163c3b76b0e5363a7f86dc542fbf03e372945
                                                            • Opcode Fuzzy Hash: 97ef8735e73c33f2e8208c73b1fd5cb49a9b4a57e13c67707e8f6e2f4d6dd491
                                                            • Instruction Fuzzy Hash: 47F03976D40208EFCB01DFB4DA489CEBBB5EB44201F1442E6D805E2240E6304B55CB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5d2841c1550f7efcb19cb3c5c758d6346c751ef8689606d746d4bf0f0d58a2eb
                                                            • Instruction ID: d398b43844ce0d9b0b6a113becdeb4919987af476c7fc1348c5ae8cc36ddf2d9
                                                            • Opcode Fuzzy Hash: 5d2841c1550f7efcb19cb3c5c758d6346c751ef8689606d746d4bf0f0d58a2eb
                                                            • Instruction Fuzzy Hash: 5DE092310003518FC726E620FD8AA853BE9E786700F03409AD8009F6E9D6A45A898B92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09bf2f0c36e306d906d0788bf5d8aca26e1846caecdd63802b05d210741013bb
                                                            • Instruction ID: 9b167df818433f9ee9a462fba2538d208ac3f5764bdd9de7e9a377de19681e33
                                                            • Opcode Fuzzy Hash: 09bf2f0c36e306d906d0788bf5d8aca26e1846caecdd63802b05d210741013bb
                                                            • Instruction Fuzzy Hash: 52D05B7531011C6786056779B4594AE7FAADAC56623404039F506C7340CE695D0987D7
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9dee59e64328594d3d5a31434af90fe2c60916268a76405fd682d88d6b47bd86
                                                            • Instruction ID: a1eefa33bae6fd81c696071fc73bac2ff5dc76fd850448f4b6f0119a80d72bec
                                                            • Opcode Fuzzy Hash: 9dee59e64328594d3d5a31434af90fe2c60916268a76405fd682d88d6b47bd86
                                                            • Instruction Fuzzy Hash: 13E0173A664250CFC712CF24D9929613FB6BF5631130D84C6E4C0CB2B3D231E925EB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc197f07dec0912749a5b7ea27202a9ed4685dd8d083e58ebeebb7ec7763eeb9
                                                            • Instruction ID: 09089331870f4447789bbb8207f3d3ff74db2b648ad0cc3d4cf03ba94c639b03
                                                            • Opcode Fuzzy Hash: dc197f07dec0912749a5b7ea27202a9ed4685dd8d083e58ebeebb7ec7763eeb9
                                                            • Instruction Fuzzy Hash: 87E07E75E0020CEFCB44DFA4E9449DEBBB9EB48200F1082EAD909A3200EA346B559B80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 005c16b24cdd097fec5c6f4ef31dd0152b97d0104ee3ef2e4d8817650b761e41
                                                            • Instruction ID: 4e8dbe2fe8ba377c8d106840145e3da99eceb878ab375bfe3d4272d1fc684c82
                                                            • Opcode Fuzzy Hash: 005c16b24cdd097fec5c6f4ef31dd0152b97d0104ee3ef2e4d8817650b761e41
                                                            • Instruction Fuzzy Hash: 54D05E71A4020CFFCB45EFB8E94195EBBF9EB84344B1085A9D809E7340FA716F049B90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 18dd3ca2326d683fb60fe04f6f9ac5bf8c57f2e24513e378349c36b3649d557e
                                                            • Instruction ID: f875a06096f5ad75dc0dab73f1ab85607805ca616189c34d5e2c72ceec6110e2
                                                            • Opcode Fuzzy Hash: 18dd3ca2326d683fb60fe04f6f9ac5bf8c57f2e24513e378349c36b3649d557e
                                                            • Instruction Fuzzy Hash: 65D0A76275026017C317177CB8042296A829BD529B746415AD916C7388C66258254781
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8f39016fa64cb15be805d7febc118d8efc0f6cc56a0e193f79145f9bd1657ed2
                                                            • Instruction ID: 91fd1e34ac756b4c9922fc29c37ab19fcfce348cc00c3661d82c03ba7fc4f24a
                                                            • Opcode Fuzzy Hash: 8f39016fa64cb15be805d7febc118d8efc0f6cc56a0e193f79145f9bd1657ed2
                                                            • Instruction Fuzzy Hash: 94B092A76CB3805AD70706248C1EA823B2A4B93E2170A40DBA6829D1A7E211440F82A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6a0bf0ec3a6831e78dd7dfbfd78ad87449e37ee4cca727f12047f79f3d11e547
                                                            • Instruction ID: cfc50cda304b6e0dbc15fb3495754a8cd66f0f8e8a147bcf23943abfdb009a83
                                                            • Opcode Fuzzy Hash: 6a0bf0ec3a6831e78dd7dfbfd78ad87449e37ee4cca727f12047f79f3d11e547
                                                            • Instruction Fuzzy Hash: 3FB012311442006EE700B6605504AA67BD1E79C722F104030F30542046C3B24813DA11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3918117980b721f5d7e145a4779a4bf3f0e62bf77c50145bcefd52e357394b1c
                                                            • Instruction ID: 4620b8b7171a72304efe8d603e101a0f04423764eafc46378d516c42e008f4c5
                                                            • Opcode Fuzzy Hash: 3918117980b721f5d7e145a4779a4bf3f0e62bf77c50145bcefd52e357394b1c
                                                            • Instruction Fuzzy Hash: D16232B06003049FDB49EF29C55472ABBE6EB84308F64C85CD10D9F396DBB6D94B8B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ee81dcb37698e1e16e44bc4df5b38d12dafa43d859fdc6b3db588278420fbb4
                                                            • Instruction ID: 748c3ea1fb29b03d942100b8c85c909ea31420f806e5b887634ad81561c81eb1
                                                            • Opcode Fuzzy Hash: 3ee81dcb37698e1e16e44bc4df5b38d12dafa43d859fdc6b3db588278420fbb4
                                                            • Instruction Fuzzy Hash: E56232B06003049FDB49DF29C55472ABBE6EB84308F64C85CD10D9F396DBB6D94B8B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efdf0992a8e6169818b8c24de58a7ce75961f868b73cdac59cb404947a928886
                                                            • Instruction ID: 15d67bd69eaab0c35c232ea1eb8fffb15c08705f9819b0f3de84e4a5856c7265
                                                            • Opcode Fuzzy Hash: efdf0992a8e6169818b8c24de58a7ce75961f868b73cdac59cb404947a928886
                                                            • Instruction Fuzzy Hash: 14A18B36E102068FCF06DFB4C9445DEB7B2FF84340B14856AE905AB269DB75E945CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2922980939.00000000022B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_22b0000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a897443877291034d86f0da6952cef1d81853f0dfd0449c880ce96d4016d0b61
                                                            • Instruction ID: b3451dbf93deba27add6f25163cfa037f604d2455ab4e3a3183adfff3f42d19b
                                                            • Opcode Fuzzy Hash: a897443877291034d86f0da6952cef1d81853f0dfd0449c880ce96d4016d0b61
                                                            • Instruction Fuzzy Hash: 4A314D4541C7D0CEC3235F7A4830A963FA0EE1326CB1B53CAC9A49B6EBE2548157C761
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2924158446.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_5b30000_ciKdWsb5h4.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (_^q$(_^q$(_^q$(_^q$(_^q$(_^q
                                                            • API String ID: 0-2896069617
                                                            • Opcode ID: 05aee646a43cd05bfa88a2ad95fb86c0cdeb0a8c9d9cc9db9af524086a61dacf
                                                            • Instruction ID: dc9b48e408934eb5f5a6670bf0deec9f12cf92019f927751fe8d42a55e69715f
                                                            • Opcode Fuzzy Hash: 05aee646a43cd05bfa88a2ad95fb86c0cdeb0a8c9d9cc9db9af524086a61dacf
                                                            • Instruction Fuzzy Hash: 3BD1E039B043049FDB05EF78C41566E7BB6FF85340B2481AAD946DB381EA35EE06CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%