Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CHEMICAL SPECIFICATIONS.exe

Overview

General Information

Sample name:CHEMICAL SPECIFICATIONS.exe
Analysis ID:1432023
MD5:f564f9251bd76e796906aebb35ae478a
SHA1:e6b87808a2a2b26bcda776e971e442598402b2bd
SHA256:386af47105d3e905ab5c1327fa634dd38e8af6d29f380cfbf0546549734d22f9
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • CHEMICAL SPECIFICATIONS.exe (PID: 6780 cmdline: "C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exe" MD5: F564F9251BD76E796906AEBB35AE478A)
    • conhost.exe (PID: 6060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • AddInProcess32.exe (PID: 7264 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
    • jsc.exe (PID: 7300 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe" MD5: 94C8E57A80DFCA2482DEDB87B93D4FD9)
    • RegAsm.exe (PID: 7316 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 7324 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 7432 cmdline: C:\Windows\system32\WerFault.exe -u -p 6780 -s 1088 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.ercolina-usa.com", "Username": "info@ercolina-usa.com", "Password": "1.$.#t~cK;4C"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x34245:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x342b7:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x34341:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x343d3:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3443d:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x344af:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x34545:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x345d5:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x3132d:$s2: GetPrivateProfileString
                • 0x309ba:$s3: get_OSFullName
                • 0x32063:$s5: remove_Key
                • 0x3223a:$s5: remove_Key
                • 0x3318e:$s6: FtpWebRequest
                • 0x34227:$s7: logins
                • 0x34799:$s7: logins
                • 0x3750c:$s7: logins
                • 0x37556:$s7: logins
                • 0x39021:$s7: logins
                • 0x380f0:$s9: 1.85 (Hash, version 2, native byte-order)
                1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 18 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.ercolina-usa.com", "Username": "info@ercolina-usa.com", "Password": "1.$.#t~cK;4C"}
                  Source: CHEMICAL SPECIFICATIONS.exeReversingLabs: Detection: 31%
                  Source: CHEMICAL SPECIFICATIONS.exeVirustotal: Detection: 12%Perma Link

                  Exploits

                  barindex
                  Source: Yara matchFile source: 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CHEMICAL SPECIFICATIONS.exe PID: 6780, type: MEMORYSTR
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.7:49703 version: TLS 1.2
                  Source: CHEMICAL SPECIFICATIONS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.ni.pdbRSDS source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.pdb@Y source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.Core.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.Core.ni.pdbRSDS source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb` source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.Core.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WER3D1F.tmp.dmp.15.dr

                  Networking

                  barindex
                  Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 192.254.225.136 192.254.225.136
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                  Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownFTP traffic detected: 192.254.225.136:21 -> 192.168.2.7:49708 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: ftp.ercolina-usa.com
                  Source: RegAsm.exe, 0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ercolina-usa.com
                  Source: RegAsm.exe, 0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.ercolina-usa.com
                  Source: RegAsm.exe, 0000000B.00000002.3809316695.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegAsm.exe, 0000000B.00000002.3809316695.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Amcache.hve.15.drString found in binary or memory: http://upx.sf.net
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: RegAsm.exe, 0000000B.00000002.3809316695.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: RegAsm.exe, 0000000B.00000002.3809316695.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.7:49703 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, BZbr69Oq62w.cs.Net Code: ReE5V4O
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, BZbr69Oq62w.cs.Net Code: ReE5V4O
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  System Summary

                  barindex
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA25281_2_00007FFAACCA2528
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCADA401_2_00007FFAACCADA40
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA46001_2_00007FFAACCA4600
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA87881_2_00007FFAACCA8788
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCABC601_2_00007FFAACCABC60
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCAEBC91_2_00007FFAACCAEBC9
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA7D181_2_00007FFAACCA7D18
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA7CF81_2_00007FFAACCA7CF8
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCAA29B1_2_00007FFAACCAA29B
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACD8026B1_2_00007FFAACD8026B
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACD80E291_2_00007FFAACD80E29
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A74A8811_2_02A74A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A7B84711_2_02A7B847
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A73E7011_2_02A73E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A7EC3811_2_02A7EC38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A741B811_2_02A741B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692629011_2_06926290
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692B2B211_2_0692B2B2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692C21011_2_0692C210
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_06927A1811_2_06927A18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692522811_2_06925228
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_069230F811_2_069230F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692241211_2_06922412
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692E43011_2_0692E430
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692733811_2_06927338
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692004011_2_06920040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692597311_2_06925973
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0692000611_2_06920006
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6780 -s 1088
                  Source: CHEMICAL SPECIFICATIONS.exeStatic PE information: No import functions for PE file found
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000000.1341562345.0000029731238000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUfizojuc4 vs CHEMICAL SPECIFICATIONS.exe
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1f6c404b-1670-4065-8ad4-e19d5fd00377.exe4 vs CHEMICAL SPECIFICATIONS.exe
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOsacudavecuxayajemur8 vs CHEMICAL SPECIFICATIONS.exe
                  Source: CHEMICAL SPECIFICATIONS.exeBinary or memory string: OriginalFilenameUfizojuc4 vs CHEMICAL SPECIFICATIONS.exe
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: CHEMICAL SPECIFICATIONS.exe, -.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, hcbDrTLwTC.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, CMQvPoq8cy.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, e5d0T5Np.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, 71JxQ8.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, CnG3o.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, 2FAFIfKp.csCryptographic APIs: 'CreateDecryptor'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, gdOsx.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, gdOsx.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@11/5@3/3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6780
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6060:120:WilError_03
                  Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a3a75f63-20d5-419f-9698-ce637d50d557Jump to behavior
                  Source: CHEMICAL SPECIFICATIONS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: CHEMICAL SPECIFICATIONS.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: CHEMICAL SPECIFICATIONS.exeReversingLabs: Detection: 31%
                  Source: CHEMICAL SPECIFICATIONS.exeVirustotal: Detection: 12%
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeFile read: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exe "C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exe"
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6780 -s 1088
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: CHEMICAL SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: CHEMICAL SPECIFICATIONS.exeStatic file information: File size 1099660 > 1048576
                  Source: CHEMICAL SPECIFICATIONS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: CHEMICAL SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.ni.pdbRSDS source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.pdb@Y source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.Core.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.Core.ni.pdbRSDS source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb` source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: System.Core.ni.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WER3D1F.tmp.dmp.15.dr
                  Source: CHEMICAL SPECIFICATIONS.exeStatic PE information: 0xB06BE3BE [Wed Oct 17 15:31:10 2063 UTC]
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCB4D91 push ecx; retf 1_2_00007FFAACCB4D92
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA00BD pushad ; iretd 1_2_00007FFAACCA00C1
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA7B80 pushad ; ret 1_2_00007FFAACCA845D
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA845E push eax; ret 1_2_00007FFAACCA846D
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACCA0413 push ds; retf 1_2_00007FFAACCA0422
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeCode function: 1_2_00007FFAACD8026B push esp; retf 4810h1_2_00007FFAACD80312
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A7F552 pushad ; ret 11_2_02A7F559
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A70CB5 push edi; ret 11_2_02A70CC2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A70C95 push edi; retf 11_2_02A70C3A

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download.png
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: CHEMICAL SPECIFICATIONS.exe PID: 6780, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmp, CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory allocated: 29731590000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory allocated: 2974AFB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2A70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2C40000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4C40000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599073Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 300000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299032Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298907Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298782Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 2218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 7606Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7556Thread sleep count: 2218 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599890s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7556Thread sleep count: 7606 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599781s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599672s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599563s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599438s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599313s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599188s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -599073s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598969s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598844s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598734s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598625s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598516s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598406s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598297s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598188s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -598063s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -597953s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -597844s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -300000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299828s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299719s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299610s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299500s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299391s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299266s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299141s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -299032s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298907s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298782s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298672s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298563s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298438s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298313s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298188s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -298063s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297953s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297844s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297719s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297610s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297485s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297360s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297235s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -297110s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -296985s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -296860s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -296735s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -296610s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -296485s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7524Thread sleep time: -296360s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599073Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 300000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299141Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 299032Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298907Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298782Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 298063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 297110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 296360Jump to behavior
                  Source: Amcache.hve.15.drBinary or memory string: VMware
                  Source: Amcache.hve.15.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.15.drBinary or memory string: VMware, Inc.
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: Amcache.hve.15.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.15.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.15.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.15.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.15.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                  Source: Amcache.hve.15.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: Amcache.hve.15.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.15.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: RegAsm.exe, 0000000B.00000002.3814714697.0000000005F68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: Amcache.hve.15.drBinary or memory string: vmci.sys
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                  Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin`
                  Source: RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: Amcache.hve.15.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: Amcache.hve.15.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.15.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.15.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.15.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.15.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.15.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.15.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                  Source: CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                  Source: Amcache.hve.15.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.15.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.15.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBox
                  Source: Amcache.hve.15.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                  Source: Amcache.hve.15.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_02A77E90 CheckRemoteDebuggerPresent,11_2_02A77E90
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: CHEMICAL SPECIFICATIONS.exe, -.csReference to suspicious API methods: ((_0658)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(_FBB5(_0603_0659_0655._0617)), _FBB5(_0603_0659_0655._FDD8_FBC6)), typeof(_0658)))("vpGUntmDH2Bs", out var _)
                  Source: CHEMICAL SPECIFICATIONS.exe, -.csReference to suspicious API methods: ((_0658)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibrary(_FBB5(_0603_0659_0655._0617)), _FBB5(_0603_0659_0655._FDD8_FBC6)), typeof(_0658)))("vpGUntmDH2Bs", out var _)
                  Source: CHEMICAL SPECIFICATIONS.exe, -.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)array.Length, 64u, out var _064F_FBC7_FDEA_065C_06E2_0600)
                  Source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, IUOWg.csReference to suspicious API methods: jbDd2l.OpenProcess(BxXbof.DuplicateHandle, bInheritHandle: true, (uint)ou7yaxEwwl2.ProcessID)
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 446000Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: B21008Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeQueries volume information: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CHEMICAL SPECIFICATIONS.exe PID: 6780, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7316, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CHEMICAL SPECIFICATIONS.exe PID: 6780, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7316, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.2974303c350.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.CHEMICAL SPECIFICATIONS.exe.29742ffaf08.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: CHEMICAL SPECIFICATIONS.exe PID: 6780, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7316, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  1
                  Exfiltration Over Alternative Protocol
                  Abuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  Boot or Logon Initialization Scripts311
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  34
                  System Information Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  541
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Timestomp
                  NTDS1
                  Process Discovery
                  Distributed Component Object Model21
                  Input Capture
                  23
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets261
                  Virtualization/Sandbox Evasion
                  SSH1
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Masquerading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items261
                  Virtualization/Sandbox Evasion
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                  Process Injection
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432023 Sample: CHEMICAL SPECIFICATIONS.exe Startdate: 26/04/2024 Architecture: WINDOWS Score: 100 20 ftp.ercolina-usa.com 2->20 22 ip-api.com 2->22 24 2 other IPs or domains 2->24 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->36 38 8 other signatures 2->38 7 CHEMICAL SPECIFICATIONS.exe 3 2->7         started        signatures3 process4 signatures5 40 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->40 42 Writes to foreign memory regions 7->42 44 Allocates memory in foreign processes 7->44 46 Injects a PE file into a foreign processes 7->46 10 RegAsm.exe 15 2 7->10         started        14 WerFault.exe 19 16 7->14         started        16 conhost.exe 7->16         started        18 3 other processes 7->18 process6 dnsIp7 26 ercolina-usa.com 192.254.225.136, 21, 49708, 49709 UNIFIEDLAYER-AS-1US United States 10->26 28 ip-api.com 208.95.112.1, 49704, 80 TUT-ASUS United States 10->28 30 api.ipify.org 104.26.13.205, 443, 49703 CLOUDFLARENETUS United States 10->30 48 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->48 50 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->50 52 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->52 54 5 other signatures 10->54 signatures8

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  CHEMICAL SPECIFICATIONS.exe32%ReversingLabsByteCode-MSIL.Trojan.Zilla
                  CHEMICAL SPECIFICATIONS.exe12%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  ercolina-usa.com1%VirustotalBrowse
                  ftp.ercolina-usa.com3%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://ercolina-usa.com0%Avira URL Cloudsafe
                  http://ftp.ercolina-usa.com0%Avira URL Cloudsafe
                  http://ftp.ercolina-usa.com3%VirustotalBrowse
                  http://ercolina-usa.com1%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ercolina-usa.com
                  192.254.225.136
                  truefalseunknown
                  api.ipify.org
                  104.26.13.205
                  truefalse
                    high
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      ftp.ercolina-usa.com
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                        high
                        http://ip-api.com/line/?fields=hostingfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgCHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002C41000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://upx.sf.netAmcache.hve.15.drfalse
                              high
                              https://account.dyn.com/CHEMICAL SPECIFICATIONS.exe, 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                https://api.ipify.org/tRegAsm.exe, 0000000B.00000002.3809316695.0000000002C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 0000000B.00000002.3809316695.0000000002C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ftp.ercolina-usa.comRegAsm.exe, 0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002D40000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • 3%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ercolina-usa.comRegAsm.exe, 0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.3809316695.0000000002D40000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • 1%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ip-api.comRegAsm.exe, 0000000B.00000002.3809316695.0000000002C91000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      192.254.225.136
                                      ercolina-usa.comUnited States
                                      46606UNIFIEDLAYER-AS-1USfalse
                                      208.95.112.1
                                      ip-api.comUnited States
                                      53334TUT-ASUSfalse
                                      104.26.13.205
                                      api.ipify.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1432023
                                      Start date and time:2024-04-26 10:05:18 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 8m 59s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:25
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:CHEMICAL SPECIFICATIONS.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.expl.evad.winEXE@11/5@3/3
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 88%
                                      • Number of executed functions: 68
                                      • Number of non-executed functions: 9
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.189.173.22
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      TimeTypeDescription
                                      10:06:28API Interceptor11554318x Sleep call for process: RegAsm.exe modified
                                      10:06:41API Interceptor1x Sleep call for process: WerFault.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      192.254.225.136QUOTATION-#170424.exeGet hashmaliciousAgentTeslaBrowse
                                        SecuriteInfo.com.Win32.CrypterX-gen.6113.26438.exeGet hashmaliciousAgentTeslaBrowse
                                          SecuriteInfo.com.Win64.PWSX-gen.371.14469.exeGet hashmaliciousAgentTeslaBrowse
                                            QUOTATION#30190.exeGet hashmaliciousAgentTeslaBrowse
                                              CHEMICAL SPECIFICATION.exeGet hashmaliciousAgentTeslaBrowse
                                                QUOTATION#00913-1HNMR FORMONONETIN LIST.exeGet hashmaliciousAgentTeslaBrowse
                                                  QUOTATION#00913.exeGet hashmaliciousAgentTeslaBrowse
                                                    SecuriteInfo.com.FileRepMalware.4794.21088.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                      SecuriteInfo.com.Win32.CrypterX-gen.17480.22966.exeGet hashmaliciousAgentTeslaBrowse
                                                        SecuriteInfo.com.Win32.PWSX-gen.19143.26592.exeGet hashmaliciousAgentTeslaBrowse
                                                          208.95.112.1TYPE_C_31_M_12 TAMAR 25.4.2024.exeGet hashmaliciousAgentTeslaBrowse
                                                          • ip-api.com/line/?fields=hosting
                                                          a.cmdGet hashmaliciousUnknownBrowse
                                                          • ip-api.com/line/?fields=hosting
                                                          xtnhsVjQTxvH.exeGet hashmaliciousQuasarBrowse
                                                          • ip-api.com/json/
                                                          o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • ip-api.com/line/?fields=hosting
                                                          SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • ip-api.com/line/?fields=hosting
                                                          SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                          • ip-api.com/json
                                                          Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                          • ip-api.com/json
                                                          Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • ip-api.com/line/?fields=hosting
                                                          SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                          • ip-api.com/line/?fields=hosting
                                                          PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                          • ip-api.com/line/?fields=hosting
                                                          104.26.13.205SecuriteInfo.com.Trojan.DownLoaderNET.960.9931.28151.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                                                          • api.ipify.org/
                                                          Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                                          • api.ipify.org/?format=json
                                                          ArenaWarSetup.exeGet hashmaliciousStealitBrowse
                                                          • api.ipify.org/?format=json
                                                          Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                          • api.ipify.org/?format=json
                                                          E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                                          • api.ipify.org/
                                                          E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                                          • api.ipify.org/
                                                          SecuriteInfo.com.Win64.RATX-gen.31127.4101.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                                                          • api.ipify.org/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          ip-api.comTYPE_C_31_M_12 TAMAR 25.4.2024.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 208.95.112.1
                                                          a.cmdGet hashmaliciousUnknownBrowse
                                                          • 208.95.112.1
                                                          xtnhsVjQTxvH.exeGet hashmaliciousQuasarBrowse
                                                          • 208.95.112.1
                                                          o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 208.95.112.1
                                                          SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 208.95.112.1
                                                          SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                          • 208.95.112.1
                                                          Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                          • 208.95.112.1
                                                          Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 208.95.112.1
                                                          SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 208.95.112.1
                                                          PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                          • 208.95.112.1
                                                          api.ipify.orgPayment.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          SOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.26.12.205
                                                          Payment Swift.docGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          https://lide.alosalca.fun/highbox#joeblow@xyz.comGet hashmaliciousHTMLPhisherBrowse
                                                          • 104.26.13.205
                                                          http://asana.wfGet hashmaliciousUnknownBrowse
                                                          • 172.67.74.152
                                                          o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 172.67.74.152
                                                          http://wsj.pmGet hashmaliciousNetSupport RATBrowse
                                                          • 104.26.12.205
                                                          16770075581.zipGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.26.12.205
                                                          SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.26.12.205
                                                          SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.26.12.205
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          CLOUDFLARENETUSPayment.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          https://usigroups-my.sharepoint.com/:o:/p/js/Es3HdUJZlbVJngCJE-Z7JCYBUTZvd1ZCMQwZhhlQoy_hDw?e=mT2aQmGet hashmaliciousHTMLPhisherBrowse
                                                          • 172.67.144.70
                                                          SOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.26.12.205
                                                          http://householdshop.club/Get hashmaliciousUnknownBrowse
                                                          • 104.17.25.14
                                                          http://xred.site50.net/syn/SSLLibrary.dllGet hashmaliciousUnknownBrowse
                                                          • 1.1.1.1
                                                          http://tracking.theimpco.com/tracking/click?d=OrpweRVshItmHO3qVpYwg0JJ3qp4iuwmt5687ge2H9uFpmeuDd2X4dPYczAnrgigX6DFu-Km6YtBvUpjEWnC0qAPektAg_1gGuxaDYDl5nf8rOcHvuOtOBIWknNeVHzB3g2Get hashmaliciousUnknownBrowse
                                                          • 1.1.1.1
                                                          http://cleverchoice.com.auGet hashmaliciousUnknownBrowse
                                                          • 104.18.28.104
                                                          http://cleverchoice.com.auGet hashmaliciousUnknownBrowse
                                                          • 104.18.28.104
                                                          http://cleverchoice.com.auGet hashmaliciousUnknownBrowse
                                                          • 104.18.28.104
                                                          Commande No 00007 de M.N.S. S.A. 24000127 MNS Distribution.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 172.67.191.112
                                                          UNIFIEDLAYER-AS-1USSOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 50.87.195.61
                                                          INQ No. HDPE-16-GM-00- PI-INQ-3001.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • 162.240.81.18
                                                          DOC-Zcns1G_.htmlGet hashmaliciousHTMLPhisherBrowse
                                                          • 192.232.216.145
                                                          DOC-Zcns1G_.htmlGet hashmaliciousHTMLPhisherBrowse
                                                          • 192.232.216.145
                                                          DOC-Zcns1G_.htmlGet hashmaliciousHTMLPhisherBrowse
                                                          • 192.232.216.145
                                                          https://www.bing.com/ck/a?!&&p=8c604c2d3901cb1eJmltdHM9MTcxMjc5MzYwMCZpZ3VpZD0wODdjNjgyYy00N2ZlLTYyOGQtMzA1ZC03YmVmNDY5NTYzNjUmaW5zaWQ9NTE2MQ&ptn=3&ver=2&hsh=3&fclid=087c682c-47fe-628d-305d-7bef46956365&u=a1aHR0cHM6Ly9rZWljb3NlY3VyaXR5LmNvbS5teC8&ntb=1Get hashmaliciousUnknownBrowse
                                                          • 192.185.214.24
                                                          https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                          • 162.241.120.242
                                                          https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                          • 162.241.120.242
                                                          https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/o76fri/enpmZG9tbF9zdXBlcnZpc29yMXN0X2Fzc2lzdGFudEBmZC5vcmc=Get hashmaliciousHTMLPhisherBrowse
                                                          • 162.241.120.242
                                                          https://pub-02d879d6055b4f31b3db7cbbb1499011.r2.dev/%60%60~~~%5D%5D%5D%5D%5D.html#theunis@khk.co.zaGet hashmaliciousHTMLPhisherBrowse
                                                          • 162.241.27.10
                                                          TUT-ASUSTYPE_C_31_M_12 TAMAR 25.4.2024.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 208.95.112.1
                                                          a.cmdGet hashmaliciousUnknownBrowse
                                                          • 208.95.112.1
                                                          xtnhsVjQTxvH.exeGet hashmaliciousQuasarBrowse
                                                          • 208.95.112.1
                                                          o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 208.95.112.1
                                                          SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 208.95.112.1
                                                          SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                          • 208.95.112.1
                                                          Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                          • 208.95.112.1
                                                          Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 208.95.112.1
                                                          SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 208.95.112.1
                                                          PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                          • 208.95.112.1
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          3b5074b1b5d032e5620f69f9f700ff0ePayment.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          SOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.26.13.205
                                                          DHL_ES567436735845755676678877988975877.vbsGet hashmaliciousFormBook, GuLoader, RemcosBrowse
                                                          • 104.26.13.205
                                                          PO-inv-CQV20(92315).exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          a.cmdGet hashmaliciousUnknownBrowse
                                                          • 104.26.13.205
                                                          http://papajoeschicago.comGet hashmaliciousUnknownBrowse
                                                          • 104.26.13.205
                                                          https://www.bing.com/ck/a?!&&p=8c604c2d3901cb1eJmltdHM9MTcxMjc5MzYwMCZpZ3VpZD0wODdjNjgyYy00N2ZlLTYyOGQtMzA1ZC03YmVmNDY5NTYzNjUmaW5zaWQ9NTE2MQ&ptn=3&ver=2&hsh=3&fclid=087c682c-47fe-628d-305d-7bef46956365&u=a1aHR0cHM6Ly9rZWljb3NlY3VyaXR5LmNvbS5teC8&ntb=1Get hashmaliciousUnknownBrowse
                                                          • 104.26.13.205
                                                          o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.26.13.205
                                                          https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                          • 104.26.13.205
                                                          http://wsj.pmGet hashmaliciousNetSupport RATBrowse
                                                          • 104.26.13.205
                                                          No context
                                                          Process:C:\Windows\System32\WerFault.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):65536
                                                          Entropy (8bit):1.0267910287452735
                                                          Encrypted:false
                                                          SSDEEP:192:6FNsaUVi1G0UnUlaWYsT+hDzuiFPZ24lO8fO6Yy:7RVi1tUnUlaDsS1zuiFPY4lO8Wty
                                                          MD5:004B06DE8CE0EE1AF6D16A25C3C5CB04
                                                          SHA1:97E85A48FB8855A8D4ABA83422EF0E78B4B66BA2
                                                          SHA-256:2DDD9A49791BD33D34BBF59593039E5F013863BDC6B330BE647F8A81E0EC68A2
                                                          SHA-512:F48C7090A7E4FA413671467C76D323C0CA59A4A1664B93ADCC7C692C6B6EF4D1CB3CE3FBE2E6B1705F5CEAC26708249026601FC994209064EE0C2DE067CF0895
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.9.2.3.8.7.8.3.6.4.1.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.9.2.3.8.8.5.2.3.9.2.1.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.0.7.0.d.8.4.5.-.8.d.0.a.-.4.a.2.f.-.b.2.b.0.-.3.6.6.8.9.a.f.5.a.f.3.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.5.2.d.e.5.2.2.-.8.1.d.7.-.4.8.d.d.-.b.8.9.f.-.7.5.c.0.0.9.7.6.2.7.9.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.C.H.E.M.I.C.A.L. .S.P.E.C.I.F.I.C.A.T.I.O.N.S...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.U.f.i.z.o.j.u.c.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.7.c.-.0.0.0.1.-.0.0.1.4.-.d.9.0.4.-.7.9.a.1.b.0.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.0.e.8.2.1.2.a.d.8.5.6.7.f.c.f.0.b.5.2.a.8.d.e.0.2.5.3.9.6.6.b.0.0.0.0.0.0.0.0.!.0.0.0.0.e.6.b.8.7.8.0.8.a.2.a.2.b.2.6.b.c.d.a.7.7.6.e.9.7.1.e.4.4.2.5.9.8.4.0.2.b.2.b.d.!.C.
                                                          Process:C:\Windows\System32\WerFault.exe
                                                          File Type:Mini DuMP crash report, 16 streams, Fri Apr 26 08:06:28 2024, 0x1205a4 type
                                                          Category:dropped
                                                          Size (bytes):435442
                                                          Entropy (8bit):3.249902725534501
                                                          Encrypted:false
                                                          SSDEEP:3072:XOS4mjscSMTi1CCq/3+vnT0AjlF4/O0VvF4P9on:+S4WY9q/3Q4AvW
                                                          MD5:29A406C86BE8CA8AA10071D56F746FFF
                                                          SHA1:A25B978DD4FBFE86D2BD6A54F08ADAF81DD0340A
                                                          SHA-256:107334C3A40AB8BB11ECD90D0166A31D6F98B85ACF6D41DA229CFBE2269D33B7
                                                          SHA-512:309ABED95A4DDBC794C1CDD22C00195407A6705954B002B56439C9A33630FC1458A257961E9ABC798B45CCD87E8183FE5F5FE738C7D4132486F2634EB244E20D
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:MDMP..a..... ........`+f............D...........l...d.......$.......................$J..............l.......8...........T...........0+...y...........8...........:..............................................................................eJ......4;......Lw......................T.......|....`+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\WerFault.exe
                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):8858
                                                          Entropy (8bit):3.716003125791636
                                                          Encrypted:false
                                                          SSDEEP:192:R6l7wVeJ6BpR6m6YNch9mgmf3qhprOx89bSy7/Vf0Hvmm:R6lXJEym6YWh9mgmf3qtSy79fq
                                                          MD5:AA04823645863BB569BC6840AFEF4643
                                                          SHA1:1B3E2C8FDE9620531496E8DA457C99E00AE30A63
                                                          SHA-256:FD7D41A616CF757CAF20D2486586EB798A435660A6ED51FE944F055A18D4B7B5
                                                          SHA-512:42C888A74A5E107650C701E9716CCB3C7D0904E10762F3407EEB702CE530FC0377C00E35B8A972BBA489AB6A9CB327BCA050C68627D69370B2F1A51B4C45AC40
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.8.0.<./.P.i.
                                                          Process:C:\Windows\System32\WerFault.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4830
                                                          Entropy (8bit):4.5906806587177575
                                                          Encrypted:false
                                                          SSDEEP:48:cvIwWl8zstJg771I9l6WpW8VYXXYm8M4JCGAFbyq85qtctfX0Vd:uIjfHI7S77VWKJMwR0Vd
                                                          MD5:0CDDA3D0102AC004F6CB19895E45B8C4
                                                          SHA1:3A6BA85D7519B49DEFE10011C399729FA9DA811F
                                                          SHA-256:D3F69AF7EE04D1FA34F2B9A20B8512DE74E3B521E3EF4812700B652360E43017
                                                          SHA-512:BF2E128CEF63050843E5653F813F7C52EFE213FCE10F5D0FD1376BD4AF72E11CCF6EB7AA709E55EBC2A8F3ADC6EB0740A33006A12D324E5E32B487424A086E20
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296589" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                          Process:C:\Windows\System32\WerFault.exe
                                                          File Type:MS Windows registry file, NT/2000 or above
                                                          Category:dropped
                                                          Size (bytes):1835008
                                                          Entropy (8bit):4.417169039982374
                                                          Encrypted:false
                                                          SSDEEP:6144:scifpi6ceLPL9skLmb0mxSWSPtaJG8nAgex285i2MMhA20X4WABlGuNL5+:Bi58xSWIZBk2MM6AFBdo
                                                          MD5:3FDF79B1CC66198EFDF39C45CD5B96E8
                                                          SHA1:63B7C3B49DB97D407776507FF3925A18105A9A63
                                                          SHA-256:F50593AB5897AB1447A96630C6246E9B1BEE4BB802BBF43CE377EAF3BB27B47F
                                                          SHA-512:C327C2793897BC8B754526BB4E3A93C358BCDE451DB3924FD33F6EC8F1A4ABFFF06FE9FCFB8DD66B393EA4C55F9BF50180CC996E82D0907AF258EE5F35A76EF4
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.42109766828886
                                                          TrID:
                                                          • Win64 Executable Console Net Framework (206006/5) 48.58%
                                                          • Win64 Executable Console (202006/5) 47.64%
                                                          • Win64 Executable (generic) (12005/4) 2.83%
                                                          • Generic Win/DOS Executable (2004/3) 0.47%
                                                          • DOS Executable Generic (2002/1) 0.47%
                                                          File name:CHEMICAL SPECIFICATIONS.exe
                                                          File size:1'099'660 bytes
                                                          MD5:f564f9251bd76e796906aebb35ae478a
                                                          SHA1:e6b87808a2a2b26bcda776e971e442598402b2bd
                                                          SHA256:386af47105d3e905ab5c1327fa634dd38e8af6d29f380cfbf0546549734d22f9
                                                          SHA512:c979305cd640afe04056d36e327acee49d4c0fa9af77cd7ec9fa6463e7b0c145400be854deda5f8739956cdd95e3bceb44306d16f899487aee53e056f7144308
                                                          SSDEEP:24576:9wzV9w070Ln2qfI3F2IJ0mxhyEtWj9gBrZkpsZIjd4bnFdtJB:wV8n2q02IdnyPg1ZyGIjd4bFdtJB
                                                          TLSH:8C35EF22DA3DEF27D619003FD24231C03E7EDF40A3EABA9584C6B5959CB6A50B134DD6
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....k..........."...0.................. ....@...... ....................................`................................
                                                          Icon Hash:07d8d8d4d4d85106
                                                          Entrypoint:0x400000
                                                          Entrypoint Section:
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows cui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0xB06BE3BE [Wed Oct 17 15:31:10 2063 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:
                                                          Instruction
                                                          dec ebp
                                                          pop edx
                                                          nop
                                                          add byte ptr [ebx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x293da.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x4d6e60x38.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x4b7a70x4b800f331433387690c25581ae392b4e99ed1False0.5202846906043046data6.380364424190111IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x4e0000x293da0x29400fb6242e117d312db2f313cc7888b4aabFalse0.054657907196969696data2.6834264830030583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x4e2dc0xce8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8692493946731235
                                                          RT_ICON0x4efc40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.027046610670767773
                                                          RT_ICON0x5f7ec0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.021967626655455118
                                                          RT_ICON0x68c940x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.03525878003696858
                                                          RT_ICON0x6e11c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.03442371280113368
                                                          RT_ICON0x723440x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.04854771784232365
                                                          RT_ICON0x748ec0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.0675422138836773
                                                          RT_ICON0x759940x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.12704918032786885
                                                          RT_ICON0x7631c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.17464539007092197
                                                          RT_GROUP_ICON0x767840x84data0.7272727272727273
                                                          RT_VERSION0x768080x4f4data0.472397476340694
                                                          RT_VERSION0x76cfc0x4f4dataEnglishUnited States0.47397476340694006
                                                          RT_MANIFEST0x771f00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 26, 2024 10:06:29.131828070 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.131866932 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.131978989 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.141459942 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.141485929 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.404597998 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.404665947 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.412077904 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.412094116 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.412421942 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.466440916 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.521934032 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.568113089 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.727396965 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.727459908 CEST44349703104.26.13.205192.168.2.7
                                                          Apr 26, 2024 10:06:29.727505922 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.733791113 CEST49703443192.168.2.7104.26.13.205
                                                          Apr 26, 2024 10:06:29.866173983 CEST4970480192.168.2.7208.95.112.1
                                                          Apr 26, 2024 10:06:30.017308950 CEST8049704208.95.112.1192.168.2.7
                                                          Apr 26, 2024 10:06:30.017407894 CEST4970480192.168.2.7208.95.112.1
                                                          Apr 26, 2024 10:06:30.017626047 CEST4970480192.168.2.7208.95.112.1
                                                          Apr 26, 2024 10:06:30.170367002 CEST8049704208.95.112.1192.168.2.7
                                                          Apr 26, 2024 10:06:30.216393948 CEST4970480192.168.2.7208.95.112.1
                                                          Apr 26, 2024 10:06:30.744395971 CEST4970480192.168.2.7208.95.112.1
                                                          Apr 26, 2024 10:06:30.895463943 CEST8049704208.95.112.1192.168.2.7
                                                          Apr 26, 2024 10:06:30.895662069 CEST4970480192.168.2.7208.95.112.1
                                                          Apr 26, 2024 10:06:31.104636908 CEST4970821192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.300962925 CEST2149708192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.301096916 CEST4970821192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.305527925 CEST4970821192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.334811926 CEST4970921192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.499418020 CEST2149708192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.499481916 CEST4970821192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.502120972 CEST2149708192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.502173901 CEST4970821192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.502593040 CEST2149708192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.502657890 CEST4970821192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.531018972 CEST2149709192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.531160116 CEST4970921192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.531394958 CEST4970921192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.532882929 CEST4971221192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.730290890 CEST2149709192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.731204033 CEST2149712192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.731281996 CEST4971221192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.731517076 CEST4971221192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.731596947 CEST2149709192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.731606960 CEST2149709192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.731668949 CEST4970921192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.731668949 CEST4970921192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.732009888 CEST2149709192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.732110023 CEST4970921192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.733134031 CEST4971321192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.928036928 CEST2149712192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.928793907 CEST2149712192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.928833961 CEST2149712192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.928901911 CEST4971221192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.928932905 CEST4971221192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.929220915 CEST2149713192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.929284096 CEST2149712192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:31.929358959 CEST4971221192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.929364920 CEST4971321192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:31.929604053 CEST4971321192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:32.126811028 CEST2149713192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:32.127259016 CEST2149713192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:32.127353907 CEST4971321192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:32.127382040 CEST2149713192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:32.127450943 CEST4971321192.168.2.7192.254.225.136
                                                          Apr 26, 2024 10:06:32.127835035 CEST2149713192.254.225.136192.168.2.7
                                                          Apr 26, 2024 10:06:32.127881050 CEST4971321192.168.2.7192.254.225.136
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 26, 2024 10:06:28.969867945 CEST6410553192.168.2.71.1.1.1
                                                          Apr 26, 2024 10:06:29.095335960 CEST53641051.1.1.1192.168.2.7
                                                          Apr 26, 2024 10:06:29.740232944 CEST5503753192.168.2.71.1.1.1
                                                          Apr 26, 2024 10:06:29.865364075 CEST53550371.1.1.1192.168.2.7
                                                          Apr 26, 2024 10:06:30.745323896 CEST6210853192.168.2.71.1.1.1
                                                          Apr 26, 2024 10:06:31.103282928 CEST53621081.1.1.1192.168.2.7
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Apr 26, 2024 10:06:28.969867945 CEST192.168.2.71.1.1.10x104dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                          Apr 26, 2024 10:06:29.740232944 CEST192.168.2.71.1.1.10x1f6eStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                          Apr 26, 2024 10:06:30.745323896 CEST192.168.2.71.1.1.10x4f92Standard query (0)ftp.ercolina-usa.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Apr 26, 2024 10:06:29.095335960 CEST1.1.1.1192.168.2.70x104dNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                          Apr 26, 2024 10:06:29.095335960 CEST1.1.1.1192.168.2.70x104dNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                          Apr 26, 2024 10:06:29.095335960 CEST1.1.1.1192.168.2.70x104dNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                          Apr 26, 2024 10:06:29.865364075 CEST1.1.1.1192.168.2.70x1f6eNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                          Apr 26, 2024 10:06:31.103282928 CEST1.1.1.1192.168.2.70x4f92No error (0)ftp.ercolina-usa.comercolina-usa.comCNAME (Canonical name)IN (0x0001)false
                                                          Apr 26, 2024 10:06:31.103282928 CEST1.1.1.1192.168.2.70x4f92No error (0)ercolina-usa.com192.254.225.136A (IP address)IN (0x0001)false
                                                          • api.ipify.org
                                                          • ip-api.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.749704208.95.112.1807316C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          TimestampBytes transferredDirectionData
                                                          Apr 26, 2024 10:06:30.017626047 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                          Host: ip-api.com
                                                          Connection: Keep-Alive
                                                          Apr 26, 2024 10:06:30.170367002 CEST175INHTTP/1.1 200 OK
                                                          Date: Fri, 26 Apr 2024 08:06:29 GMT
                                                          Content-Type: text/plain; charset=utf-8
                                                          Content-Length: 6
                                                          Access-Control-Allow-Origin: *
                                                          X-Ttl: 60
                                                          X-Rl: 44
                                                          Data Raw: 66 61 6c 73 65 0a
                                                          Data Ascii: false


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.749703104.26.13.2054437316C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-04-26 08:06:29 UTC155OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                          Host: api.ipify.org
                                                          Connection: Keep-Alive
                                                          2024-04-26 08:06:29 UTC211INHTTP/1.1 200 OK
                                                          Date: Fri, 26 Apr 2024 08:06:29 GMT
                                                          Content-Type: text/plain
                                                          Content-Length: 15
                                                          Connection: close
                                                          Vary: Origin
                                                          CF-Cache-Status: DYNAMIC
                                                          Server: cloudflare
                                                          CF-RAY: 87a512e32e1767e7-MIA
                                                          2024-04-26 08:06:29 UTC15INData Raw: 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 32 30
                                                          Data Ascii: 102.129.152.220


                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                          Apr 26, 2024 10:06:31.499418020 CEST2149708192.254.225.136192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                          Apr 26, 2024 10:06:31.502120972 CEST2149708192.254.225.136192.168.2.7220 Logout.
                                                          Apr 26, 2024 10:06:31.731596947 CEST2149709192.254.225.136192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                          Apr 26, 2024 10:06:31.731606960 CEST2149709192.254.225.136192.168.2.7220 Logout.
                                                          Apr 26, 2024 10:06:31.928793907 CEST2149712192.254.225.136192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                          Apr 26, 2024 10:06:31.928833961 CEST2149712192.254.225.136192.168.2.7220 Logout.
                                                          Apr 26, 2024 10:06:32.127259016 CEST2149713192.254.225.136192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 03:06. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                          Apr 26, 2024 10:06:32.127382040 CEST2149713192.254.225.136192.168.2.7220 Logout.

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:1
                                                          Start time:10:06:23
                                                          Start date:26/04/2024
                                                          Path:C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\Desktop\CHEMICAL SPECIFICATIONS.exe"
                                                          Imagebase:0x297311d0000
                                                          File size:1'099'660 bytes
                                                          MD5 hash:F564F9251BD76E796906AEBB35AE478A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1519098405.000002973322C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.1520677325.0000029742FB7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:10:06:24
                                                          Start date:26/04/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff75da10000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:10:06:26
                                                          Start date:26/04/2024
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                          Wow64 process (32bit):
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                          Imagebase:
                                                          File size:43'008 bytes
                                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:10
                                                          Start time:10:06:27
                                                          Start date:26/04/2024
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                          Wow64 process (32bit):
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                          Imagebase:
                                                          File size:47'584 bytes
                                                          MD5 hash:94C8E57A80DFCA2482DEDB87B93D4FD9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:11
                                                          Start time:10:06:27
                                                          Start date:26/04/2024
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                          Imagebase:0x950000
                                                          File size:65'440 bytes
                                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.3809316695.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.3809316695.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.3805886777.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:12
                                                          Start time:10:06:27
                                                          Start date:26/04/2024
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                          Imagebase:0xd00000
                                                          File size:65'440 bytes
                                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:10:06:27
                                                          Start date:26/04/2024
                                                          Path:C:\Windows\System32\WerFault.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 6780 -s 1088
                                                          Imagebase:0x7ff6f9550000
                                                          File size:570'736 bytes
                                                          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:11.6%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:38
                                                            Total number of Limit Nodes:1
                                                            execution_graph 13218 7ffaacca2f62 13219 7ffaacca2f69 13218->13219 13220 7ffaacca0618 LoadLibraryA 13219->13220 13221 7ffaacca2f77 13220->13221 13222 7ffaacca2780 LoadLibraryA 13221->13222 13223 7ffaacca2f84 13222->13223 13224 7ffaacca0618 LoadLibraryA 13223->13224 13225 7ffaacca2fa6 13224->13225 13226 7ffaacca2780 LoadLibraryA 13225->13226 13227 7ffaacca2fb3 13226->13227 13193 7ffaacca2d84 13194 7ffaacca2d8d VirtualProtect 13193->13194 13196 7ffaacca2e51 13194->13196 13197 7ffaacca2e84 13198 7ffaacca2e8d 13197->13198 13209 7ffaacca2780 13198->13209 13200 7ffaacca2ed3 13214 7ffaacca0618 13200->13214 13203 7ffaacca2780 LoadLibraryA 13204 7ffaacca2f09 13203->13204 13205 7ffaacca0618 LoadLibraryA 13204->13205 13206 7ffaacca2f2b 13205->13206 13207 7ffaacca2780 LoadLibraryA 13206->13207 13208 7ffaacca2f38 13207->13208 13212 7ffaacca279b 13209->13212 13210 7ffaacca27ef 13210->13200 13211 7ffaacca2930 LoadLibraryA 13213 7ffaacca2984 13211->13213 13212->13200 13212->13210 13212->13211 13213->13200 13215 7ffaacca3000 13214->13215 13216 7ffaacca2780 LoadLibraryA 13215->13216 13217 7ffaacca2efc 13216->13217 13217->13203 13228 7ffaacca2fe9 13229 7ffaacca3037 13228->13229 13230 7ffaacca2780 LoadLibraryA 13229->13230 13231 7ffaacca3060 13230->13231 13189 7ffaacca0a58 13190 7ffaacca0a61 FreeConsole 13189->13190 13192 7ffaacca0afe 13190->13192

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 344 7ffaacd8026b-7ffaacd8026d 345 7ffaacd803b1-7ffaacd803b7 344->345 346 7ffaacd8026e-7ffaacd8027c 344->346 349 7ffaacd803b9-7ffaacd803c8 345->349 348 7ffaacd80284-7ffaacd80286 346->348 350 7ffaacd80288-7ffaacd80289 348->350 351 7ffaacd802f7-7ffaacd80306 348->351 353 7ffaacd803c9-7ffaacd80427 349->353 354 7ffaacd8024f-7ffaacd8026a 350->354 355 7ffaacd8028b 350->355 352 7ffaacd80307-7ffaacd80309 351->352 352->345 357 7ffaacd8030a-7ffaacd80348 352->357 371 7ffaacd8045c-7ffaacd80474 353->371 372 7ffaacd80429-7ffaacd80440 353->372 354->344 355->352 356 7ffaacd8028d 355->356 359 7ffaacd8028f-7ffaacd802a0 356->359 360 7ffaacd802d4 356->360 357->349 382 7ffaacd8034a-7ffaacd8034d 357->382 363 7ffaacd80236-7ffaacd8024e 359->363 364 7ffaacd802a2-7ffaacd802b8 359->364 360->345 365 7ffaacd802da-7ffaacd802f5 360->365 363->354 364->345 369 7ffaacd802be-7ffaacd802d1 364->369 365->351 369->360 375 7ffaacd804b1-7ffaacd804d0 372->375 376 7ffaacd80442-7ffaacd8045a 372->376 378 7ffaacd804d1-7ffaacd804e7 375->378 376->371 376->378 384 7ffaacd8051c-7ffaacd80534 378->384 385 7ffaacd804e9-7ffaacd80500 378->385 382->353 383 7ffaacd8034f 382->383 386 7ffaacd80351-7ffaacd8035f 383->386 387 7ffaacd80396-7ffaacd803b0 383->387 388 7ffaacd80571-7ffaacd80590 385->388 389 7ffaacd80502-7ffaacd8051a 385->389 386->387 393 7ffaacd80597-7ffaacd805c0 388->393 394 7ffaacd80592 388->394 389->384 398 7ffaacd80631-7ffaacd80668 393->398 399 7ffaacd805c2-7ffaacd805f4 393->399 394->393 400 7ffaacd8069d-7ffaacd806a8 398->400 401 7ffaacd8066a-7ffaacd8067a 398->401 410 7ffaacd806bc-7ffaacd806c5 400->410 411 7ffaacd806aa-7ffaacd806b9 400->411 403 7ffaacd8067c-7ffaacd8067e 401->403 404 7ffaacd806eb-7ffaacd806f9 401->404 408 7ffaacd80680 403->408 409 7ffaacd806fa-7ffaacd8073c 403->409 404->409 413 7ffaacd806c6-7ffaacd806c7 408->413 415 7ffaacd80682-7ffaacd8069c 408->415 417 7ffaacd8073e-7ffaacd80772 409->417 418 7ffaacd80786-7ffaacd8078b 409->418 410->413 411->410 415->400 420 7ffaacd80778-7ffaacd80785 417->420 421 7ffaacd80a42-7ffaacd80a56 417->421 418->421 422 7ffaacd8078c-7ffaacd8079e 418->422 420->418 427 7ffaacd80a57-7ffaacd80ab7 421->427 423 7ffaacd8079f-7ffaacd807bd 422->423 423->421 426 7ffaacd807c3-7ffaacd807d6 423->426 432 7ffaacd807d8-7ffaacd807d9 426->432 433 7ffaacd80847-7ffaacd80856 426->433 435 7ffaacd80aec-7ffaacd80b04 427->435 436 7ffaacd80ab9-7ffaacd80ad0 427->436 432->423 437 7ffaacd807db 432->437 434 7ffaacd80857-7ffaacd80859 433->434 434->421 440 7ffaacd8085a-7ffaacd80872 434->440 441 7ffaacd80b41-7ffaacd80b77 436->441 442 7ffaacd80ad2-7ffaacd80aeb 436->442 437->434 438 7ffaacd807dd 437->438 444 7ffaacd807df-7ffaacd807f0 438->444 445 7ffaacd80824 438->445 456 7ffaacd80874-7ffaacd80877 440->456 457 7ffaacd808e3-7ffaacd808f0 440->457 454 7ffaacd80bac-7ffaacd80bc4 441->454 455 7ffaacd80b79-7ffaacd80b90 441->455 442->435 444->418 452 7ffaacd807f2-7ffaacd80808 444->452 445->421 449 7ffaacd8082a-7ffaacd80845 445->449 449->433 452->421 458 7ffaacd8080e-7ffaacd80821 452->458 460 7ffaacd80c01-7ffaacd80c37 455->460 461 7ffaacd80b92-7ffaacd80bab 455->461 463 7ffaacd80879 456->463 464 7ffaacd808f3 456->464 457->464 458->445 475 7ffaacd80c6c-7ffaacd80c84 460->475 476 7ffaacd80c39-7ffaacd80c50 460->476 461->454 468 7ffaacd808c0 463->468 469 7ffaacd8087b-7ffaacd808a2 463->469 464->421 466 7ffaacd808f9-7ffaacd8090c 464->466 482 7ffaacd8090e-7ffaacd80912 466->482 483 7ffaacd8097d-7ffaacd80990 466->483 472 7ffaacd808c3-7ffaacd808e1 468->472 473 7ffaacd808c2 468->473 469->421 470 7ffaacd808a8-7ffaacd808be 469->470 470->421 470->468 472->457 473->472 479 7ffaacd80cc1-7ffaacd80cfe 476->479 480 7ffaacd80c52-7ffaacd80c6a 476->480 480->475 486 7ffaacd80914 482->486 487 7ffaacd80993 482->487 483->487 490 7ffaacd80974-7ffaacd8097b 486->490 487->421 488 7ffaacd80999-7ffaacd809b5 487->488 494 7ffaacd809b7-7ffaacd809cc 488->494 495 7ffaacd809d2-7ffaacd809e6 488->495 490->483 494->495 495->427 496 7ffaacd809e8-7ffaacd809ed 495->496 496->490 498 7ffaacd809ef 496->498 498->421
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523709995.00007FFAACD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacd80000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: A
                                                            • API String ID: 0-3554254475
                                                            • Opcode ID: 2cd9a0f12e545f233c8d698c785c7c288043103dba1d29dddf5e5d80a52d1c09
                                                            • Instruction ID: 5b2eb656de51e332f5282cb27cb59b449eb83e0127b0089cdb9858806beeaa6f
                                                            • Opcode Fuzzy Hash: 2cd9a0f12e545f233c8d698c785c7c288043103dba1d29dddf5e5d80a52d1c09
                                                            • Instruction Fuzzy Hash: A562067290EB868FE755DB2888555B5BFE0FF56300F0845FED09DCB192DA28A90AC7C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 683 7ffaacca2528-7ffaacca4ae1 call 7ffaacca49a0 690 7ffaacca4b04-7ffaacca4b13 683->690 691 7ffaacca4ae3-7ffaacca4af9 call 7ffaacca49a0 call 7ffaacca49f0 690->691 692 7ffaacca4b15-7ffaacca4b2f call 7ffaacca49a0 call 7ffaacca49f0 690->692 701 7ffaacca4afb-7ffaacca4b02 691->701 702 7ffaacca4b30-7ffaacca4b80 691->702 701->690 705 7ffaacca4b82-7ffaacca4b87 call 7ffaacca4148 702->705 706 7ffaacca4b8c-7ffaacca4bc3 702->706 705->706 709 7ffaacca4bc9-7ffaacca4bd4 706->709 710 7ffaacca4dbf-7ffaacca4e29 706->710 711 7ffaacca4bd6-7ffaacca4be4 709->711 712 7ffaacca4c48-7ffaacca4c4d 709->712 741 7ffaacca4e46-7ffaacca4e70 710->741 742 7ffaacca4e2b-7ffaacca4e31 710->742 711->710 713 7ffaacca4bea-7ffaacca4bf9 711->713 715 7ffaacca4c4f-7ffaacca4c5b 712->715 716 7ffaacca4cc0-7ffaacca4cca 712->716 717 7ffaacca4bfb-7ffaacca4c2b 713->717 718 7ffaacca4c2d-7ffaacca4c38 713->718 715->710 720 7ffaacca4c61-7ffaacca4c74 715->720 721 7ffaacca4cec-7ffaacca4cf4 716->721 722 7ffaacca4ccc-7ffaacca4cd9 call 7ffaacca4168 716->722 717->718 726 7ffaacca4c79-7ffaacca4c7c 717->726 718->710 724 7ffaacca4c3e-7ffaacca4c46 718->724 725 7ffaacca4cf7-7ffaacca4d02 720->725 721->725 737 7ffaacca4cde-7ffaacca4cea 722->737 724->711 724->712 725->710 728 7ffaacca4d08-7ffaacca4d18 725->728 733 7ffaacca4c92-7ffaacca4c9a 726->733 734 7ffaacca4c7e-7ffaacca4c8e 726->734 728->710 731 7ffaacca4d1e-7ffaacca4d2b 728->731 731->710 736 7ffaacca4d31-7ffaacca4d51 731->736 733->710 735 7ffaacca4ca0-7ffaacca4cbf 733->735 734->733 736->710 747 7ffaacca4d53-7ffaacca4d62 736->747 737->721 744 7ffaacca4e33-7ffaacca4e44 742->744 745 7ffaacca4e71-7ffaacca4ec5 742->745 744->741 744->742 756 7ffaacca4ec7-7ffaacca4ed7 745->756 757 7ffaacca4ed9-7ffaacca4f11 745->757 748 7ffaacca4d64-7ffaacca4d6f 747->748 749 7ffaacca4dad-7ffaacca4dbe 747->749 748->749 754 7ffaacca4d71-7ffaacca4da8 call 7ffaacca4168 748->754 754->749 756->756 756->757 763 7ffaacca4f13-7ffaacca4f19 757->763 764 7ffaacca4f68-7ffaacca4f6f 757->764 763->764 765 7ffaacca4f1b-7ffaacca4f1c 763->765 767 7ffaacca4fb2-7ffaacca4fdb 764->767 768 7ffaacca4f71-7ffaacca4f72 764->768 769 7ffaacca4f1f-7ffaacca4f22 765->769 771 7ffaacca4f75-7ffaacca4f78 768->771 773 7ffaacca4f28-7ffaacca4f35 769->773 774 7ffaacca4fdc-7ffaacca4ff1 769->774 771->774 775 7ffaacca4f7a-7ffaacca4f8b 771->775 776 7ffaacca4f37-7ffaacca4f5e 773->776 777 7ffaacca4f61-7ffaacca4f66 773->777 784 7ffaacca4ff3-7ffaacca4ffa 774->784 785 7ffaacca4ffb-7ffaacca5081 774->785 778 7ffaacca4fa9-7ffaacca4fb0 775->778 779 7ffaacca4f8d-7ffaacca4f93 775->779 776->777 777->764 777->769 778->767 778->771 779->774 783 7ffaacca4f95-7ffaacca4fa5 779->783 783->778 784->785
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: d
                                                            • API String ID: 0-2564639436
                                                            • Opcode ID: 1887d340a015c4b689edd2711cb03f4b02187eb31a0f84b50ec9832f9e5d601a
                                                            • Instruction ID: 3d3ba4c97ae1fc5b06729e7d13ba9c7a0d5585a01a29d57f2e13705fea1604f7
                                                            • Opcode Fuzzy Hash: 1887d340a015c4b689edd2711cb03f4b02187eb31a0f84b50ec9832f9e5d601a
                                                            • Instruction Fuzzy Hash: 9622777191DA4A8FE349DF28D4895B1B7E2FF86310B0482B9D49EC7197DE28E84787C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fish
                                                            • API String ID: 0-1064584243
                                                            • Opcode ID: 4a8676b7df963b8cf674e30f01497fe18da6e8b35b163ea9b7c113a19cd46a1c
                                                            • Instruction ID: 2926980b83c647ef270fbf370da5aeaa8a7570b3a6527da694cfb82b0d5dd224
                                                            • Opcode Fuzzy Hash: 4a8676b7df963b8cf674e30f01497fe18da6e8b35b163ea9b7c113a19cd46a1c
                                                            • Instruction Fuzzy Hash: CCC14871A1DA8A4FF75CEB3894595B977E2EF96310B04817EE08FC3193DE18E8068781
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1089 7ffaaccaebc9-7ffaaccaec3e 1094 7ffaaccaec40-7ffaaccaec45 1089->1094 1095 7ffaaccaecaf-7ffaaccaecc5 call 7ffaaccab120 1089->1095 1096 7ffaaccaecc6-7ffaaccaecda 1094->1096 1097 7ffaaccaec47-7ffaaccaec61 call 7ffaacca77c0 1094->1097 1108 7ffaaccaecc7-7ffaaccaecda 1095->1108 1109 7ffaaccaecdf-7ffaaccaecea 1095->1109 1099 7ffaaccaed78-7ffaaccaed7a 1096->1099 1102 7ffaaccaed7c-7ffaaccaed81 1099->1102 1103 7ffaaccaedeb-7ffaaccaedf0 1099->1103 1106 7ffaaccaee02 1102->1106 1107 7ffaaccaed83-7ffaaccaed9f 1102->1107 1103->1106 1110 7ffaaccaee04-7ffaaccaee05 1106->1110 1111 7ffaaccaee08-7ffaaccaee56 call 7ffaaccab120 * 2 call 7ffaacca7420 1106->1111 1108->1099 1112 7ffaaccaecec-7ffaaccaecff 1109->1112 1113 7ffaaccaed01-7ffaaccaed0c 1109->1113 1110->1111 1128 7ffaaccaefd9-7ffaaccaf033 1111->1128 1129 7ffaaccaee5c-7ffaaccaee7a 1111->1129 1112->1099 1116 7ffaaccaed22-7ffaaccaed41 1113->1116 1117 7ffaaccaed0e-7ffaaccaed20 1113->1117 1116->1099 1121 7ffaaccaed43-7ffaaccaed74 1116->1121 1117->1099 1121->1099 1143 7ffaaccaf039-7ffaaccaf094 call 7ffaaccab120 * 2 call 7ffaacca7420 1128->1143 1144 7ffaaccaf166-7ffaaccaf1c3 1128->1144 1129->1128 1130 7ffaaccaee80-7ffaaccaee9f 1129->1130 1134 7ffaaccaef20-7ffaaccaef2a 1130->1134 1135 7ffaaccaeea1-7ffaaccaeec0 1130->1135 1136 7ffaaccaef2c-7ffaaccaef2f 1134->1136 1137 7ffaaccaef5e-7ffaaccaefaf call 7ffaaccabaf0 1134->1137 1139 7ffaaccaeec2-7ffaaccaeec7 1135->1139 1140 7ffaaccaef31-7ffaaccaef46 1135->1140 1136->1137 1137->1128 1150 7ffaaccaefb1-7ffaaccaefd8 1137->1150 1142 7ffaaccaef48-7ffaaccaef59 1139->1142 1145 7ffaaccaeec9-7ffaaccaef18 call 7ffaacca77c0 1139->1145 1140->1142 1142->1137 1147 7ffaaccaef5b-7ffaaccaef5c 1142->1147 1143->1144 1166 7ffaaccaf09a-7ffaaccaf0f0 1143->1166 1158 7ffaaccaf1c9-7ffaaccaf21e call 7ffaaccab120 * 2 call 7ffaacca7420 1144->1158 1159 7ffaaccaf27e-7ffaaccaf289 1144->1159 1145->1140 1154 7ffaaccaef1a-7ffaaccaef1f 1145->1154 1147->1137 1154->1134 1158->1159 1179 7ffaaccaf220-7ffaaccaf244 1158->1179 1167 7ffaaccaf28b-7ffaaccaf28d 1159->1167 1168 7ffaaccaf28e-7ffaaccaf2d7 1159->1168 1166->1144 1170 7ffaaccaf0f2-7ffaaccaf13d call 7ffaaccabaf0 1166->1170 1167->1168 1177 7ffaaccaf2dd-7ffaaccaf336 call 7ffaaccab120 * 2 call 7ffaacca7420 1168->1177 1178 7ffaaccaf46b-7ffaaccaf49a 1168->1178 1170->1144 1180 7ffaaccaf13f-7ffaaccaf165 1170->1180 1177->1178 1198 7ffaaccaf33c-7ffaaccaf35a 1177->1198 1192 7ffaaccaf4e4-7ffaaccaf523 call 7ffaaccab120 * 2 call 7ffaacca7420 1178->1192 1193 7ffaaccaf49c-7ffaaccaf4c7 1178->1193 1183 7ffaaccaf272-7ffaaccaf27d 1179->1183 1184 7ffaaccaf246-7ffaaccaf256 1179->1184 1184->1159 1187 7ffaaccaf258-7ffaaccaf26f 1184->1187 1187->1183 1195 7ffaaccaf627-7ffaaccaf659 1192->1195 1218 7ffaaccaf529-7ffaaccaf544 1192->1218 1193->1195 1196 7ffaaccaf4cd-7ffaaccaf4e3 1193->1196 1213 7ffaaccaf6a3-7ffaaccaf6bd call 7ffaaccab120 1195->1213 1214 7ffaaccaf65b-7ffaaccaf686 1195->1214 1196->1192 1198->1178 1202 7ffaaccaf360-7ffaaccaf37a 1198->1202 1205 7ffaaccaf3d3-7ffaaccaf3d7 1202->1205 1206 7ffaaccaf37c-7ffaaccaf39a 1202->1206 1210 7ffaaccaf458-7ffaaccaf46a 1205->1210 1211 7ffaaccaf3d9-7ffaaccaf43f call 7ffaacca77c0 call 7ffaaccabaf0 1205->1211 1215 7ffaaccaf3b3-7ffaaccaf3c4 1206->1215 1216 7ffaaccaf39c-7ffaaccaf3b1 1206->1216 1228 7ffaaccaf441 1211->1228 1219 7ffaaccaf755-7ffaaccaf767 1213->1219 1214->1219 1220 7ffaaccaf68c-7ffaaccaf69f 1214->1220 1221 7ffaaccaf3c8-7ffaaccaf3d0 1215->1221 1216->1221 1225 7ffaaccaf546-7ffaaccaf549 1218->1225 1226 7ffaaccaf59d-7ffaaccaf5a4 1218->1226 1239 7ffaaccaf7a9-7ffaaccaf7b7 1219->1239 1240 7ffaaccaf769-7ffaaccaf77d 1219->1240 1220->1213 1227 7ffaaccaf3d2 1221->1227 1221->1228 1232 7ffaaccaf5ca-7ffaaccaf5d9 1225->1232 1233 7ffaaccaf54b-7ffaaccaf569 1225->1233 1226->1195 1235 7ffaaccaf5aa-7ffaaccaf5c7 1226->1235 1227->1205 1228->1178 1231 7ffaaccaf443-7ffaaccaf456 1228->1231 1231->1210 1237 7ffaaccaf5da-7ffaaccaf5ee call 7ffaaccabaf0 1232->1237 1233->1237 1238 7ffaaccaf56b-7ffaaccaf570 1233->1238 1235->1232 1244 7ffaaccaf5f1-7ffaaccaf5fd 1237->1244 1243 7ffaaccaf572-7ffaaccaf596 call 7ffaacca77c0 1238->1243 1238->1244 1241 7ffaaccaf913-7ffaaccaf929 1239->1241 1242 7ffaaccaf7bd-7ffaaccaf7d1 1239->1242 1245 7ffaaccaf77e 1240->1245 1246 7ffaaccaf77f-7ffaaccaf78a 1240->1246 1258 7ffaaccaf92a 1241->1258 1259 7ffaaccaf92b-7ffaaccaf93f 1241->1259 1249 7ffaaccaf7d4-7ffaaccaf80f call 7ffaaccab120 * 2 call 7ffaaccacda0 1242->1249 1243->1226 1244->1195 1250 7ffaaccaf5ff-7ffaaccaf626 1244->1250 1245->1246 1246->1249 1252 7ffaaccaf78c-7ffaaccaf7a6 1246->1252 1272 7ffaaccaf829-7ffaaccaf834 1249->1272 1273 7ffaaccaf811-7ffaaccaf827 1249->1273 1252->1239 1258->1259 1263 7ffaaccaf941-7ffaaccaf979 1259->1263 1265 7ffaaccaf97b-7ffaaccaf98d call 7ffaacca0188 1263->1265 1266 7ffaaccaf98f 1263->1266 1269 7ffaaccaf994-7ffaaccaf996 1265->1269 1266->1269 1270 7ffaaccaf998-7ffaaccaf9a6 1269->1270 1271 7ffaaccaf9aa-7ffaaccaf9bb 1269->1271 1270->1271 1277 7ffaaccaf9e8-7ffaaccafa21 1271->1277 1278 7ffaaccaf9bd-7ffaaccaf9e7 1271->1278 1281 7ffaaccaf846 1272->1281 1282 7ffaaccaf836-7ffaaccaf844 1272->1282 1273->1272 1298 7ffaaccafb08-7ffaaccafb0f 1277->1298 1299 7ffaaccafa27-7ffaaccafa9f 1277->1299 1278->1277 1283 7ffaaccaf848-7ffaaccaf84d 1281->1283 1282->1283 1285 7ffaaccaf870-7ffaaccaf886 1283->1285 1286 7ffaaccaf84f-7ffaaccaf86e call 7ffaacca2590 1283->1286 1293 7ffaaccaf888-7ffaaccaf899 1285->1293 1294 7ffaaccaf89a-7ffaaccaf8af call 7ffaaccad790 1285->1294 1292 7ffaaccaf8b3-7ffaaccaf8b9 1286->1292 1292->1258 1296 7ffaaccaf8bb-7ffaaccaf8c0 1292->1296 1293->1294 1294->1292 1296->1263 1300 7ffaaccaf8c2-7ffaaccaf8f0 call 7ffaacca77c0 call 7ffaacca7420 1296->1300 1301 7ffaaccafb2c-7ffaaccafb3c 1298->1301 1302 7ffaaccafb11-7ffaaccafb1e 1298->1302 1318 7ffaaccafaa1-7ffaaccafaa7 call 7ffaacca8d10 1299->1318 1319 7ffaaccafaff-7ffaaccafb07 call 7ffaaccafb54 1299->1319 1300->1241 1315 7ffaaccaf8f2-7ffaaccaf912 1300->1315 1310 7ffaaccafb42-7ffaaccafb53 1301->1310 1302->1301 1309 7ffaaccafb20-7ffaaccafb2a 1302->1309 1309->1301 1323 7ffaaccafaac-7ffaaccafabb 1318->1323 1319->1298 1325 7ffaaccafae7-7ffaaccafafe 1323->1325 1326 7ffaaccafabd-7ffaaccafae3 1323->1326 1325->1319 1326->1325
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 54d36e7a5f778adefd76d95a3d2e8751a3cc123f625a94d276749ba3da2ed1bf
                                                            • Instruction ID: 0ee5a18c2f23f63c897ee4bfa22bff6fc8998e014a36151610b9df243917cb0a
                                                            • Opcode Fuzzy Hash: 54d36e7a5f778adefd76d95a3d2e8751a3cc123f625a94d276749ba3da2ed1bf
                                                            • Instruction Fuzzy Hash: A4B2383161DB458FE359DF2884954B5B7E2FF86301B0485BEE48AC72A6DE34E84AC7C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523709995.00007FFAACD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacd80000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f73e523dd03c7634d15d269077d09bfb8e84c080c8f4199a11ef03e337d8edb7
                                                            • Instruction ID: 081d4f65bf50d0672465e35e83f5f0ef26657db0202e9a6410e5a6c79655aab1
                                                            • Opcode Fuzzy Hash: f73e523dd03c7634d15d269077d09bfb8e84c080c8f4199a11ef03e337d8edb7
                                                            • Instruction Fuzzy Hash: 3472F77290E7868FE756DB2888565B57FE0EF57300B0942FED09DC7192DA28A90EC7C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 308f47306e1c2b86897db62fb6f7a8819fbcd32ef55f1dda595d580e2be2bbe0
                                                            • Instruction ID: 64c9797e71aff7b725a106d28ce5fa0ab4c26e5d8b6f821cc5d32230ac5251ef
                                                            • Opcode Fuzzy Hash: 308f47306e1c2b86897db62fb6f7a8819fbcd32ef55f1dda595d580e2be2bbe0
                                                            • Instruction Fuzzy Hash: CD520970A0DA098FEB68DF28D459A7977E2FF59700B1441BDE48EC7292DE24EC46C781
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 11e9185aa5eed0eddf2f720b28a58014da570ec5e07e0dd82481cce9d4f80ada
                                                            • Instruction ID: 04e3f27ea6e2b59672af4a033fa3909c400130fa3c60ab7ea58ee4b45b5133fe
                                                            • Opcode Fuzzy Hash: 11e9185aa5eed0eddf2f720b28a58014da570ec5e07e0dd82481cce9d4f80ada
                                                            • Instruction Fuzzy Hash: 01125D72A0EA468FF399DF2848596B577D2EF96710B0441BED48EC72D3DD18E81A83C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d96ee9bbc3d1f22dd91a29ad2bde27c50320ff164bb376983687f053a895f34
                                                            • Instruction ID: bb29ae5205e2e807473f2e8f18fa5cedf1b509dd6af2caea02d458d53ca48bbc
                                                            • Opcode Fuzzy Hash: 2d96ee9bbc3d1f22dd91a29ad2bde27c50320ff164bb376983687f053a895f34
                                                            • Instruction Fuzzy Hash: 01D17A3450DB858FE31DCB2884A51B5B7E2FF96301B5486BED4CAC3296DA24E44AC7C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: $
                                                            • API String ID: 1029625771-3993045852
                                                            • Opcode ID: c400f6e33459dced3adaa53bfbe0aa4f5b7f50905b9a93dc264a76a2cf31eb58
                                                            • Instruction ID: c82cc459b9e83f0ac26e42e629274beaa20723c952acf1a0e2704906785ade02
                                                            • Opcode Fuzzy Hash: c400f6e33459dced3adaa53bfbe0aa4f5b7f50905b9a93dc264a76a2cf31eb58
                                                            • Instruction Fuzzy Hash: A481A370508A4D8FEB58EF28D8497B57BE2FF59310F10817EE84EC7292DA75E8458B81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1075 7ffaacca2d84-7ffaacca2d8b 1076 7ffaacca2d96-7ffaacca2e4f VirtualProtect 1075->1076 1077 7ffaacca2d8d-7ffaacca2d95 1075->1077 1080 7ffaacca2e57-7ffaacca2e7f 1076->1080 1081 7ffaacca2e51 1076->1081 1077->1076 1081->1080
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: a85fe783fa1d677867aa49d0f89ca30c95a97e25cf76e3ef66debefa01aacecf
                                                            • Instruction ID: a6a1f1f57f11b4a1c6a02a9b5966e22cf142e8cb1a3998d00db7a18136ace5e9
                                                            • Opcode Fuzzy Hash: a85fe783fa1d677867aa49d0f89ca30c95a97e25cf76e3ef66debefa01aacecf
                                                            • Instruction Fuzzy Hash: 4031F83090CA488FDB08DBA8D84A6F9BBE1EF56321F04426FD049C3692DB74A856C791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1082 7ffaacca0a58-7ffaacca0a5f 1083 7ffaacca0a6a-7ffaacca0afc FreeConsole 1082->1083 1084 7ffaacca0a61-7ffaacca0a69 1082->1084 1087 7ffaacca0b04-7ffaacca0b2b 1083->1087 1088 7ffaacca0afe 1083->1088 1084->1083 1088->1087
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID: ConsoleFree
                                                            • String ID:
                                                            • API String ID: 771614528-0
                                                            • Opcode ID: e6fe4b53149075b3f3f2e3a4bbecab334917a5a72c8882958366e6b137405239
                                                            • Instruction ID: bd2bd270a7273ad792064c1dc6ec915fa2e18bdb7c2baa5a2895d165b8499e78
                                                            • Opcode Fuzzy Hash: e6fe4b53149075b3f3f2e3a4bbecab334917a5a72c8882958366e6b137405239
                                                            • Instruction Fuzzy Hash: 5721957090CB488FEB19DF68D849BEABBE0EF56321F00426ED04AC3552DB74A445CB51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523709995.00007FFAACD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacd80000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c51dbedfe3df9f1e24c2c56f9742213634c12e11996c3142ddb9707a0bdb8ae8
                                                            • Instruction ID: 0d9f834c22216ec53c7f7f067abd05e1e2852fcc3411fb14085b5261f0a25498
                                                            • Opcode Fuzzy Hash: c51dbedfe3df9f1e24c2c56f9742213634c12e11996c3142ddb9707a0bdb8ae8
                                                            • Instruction Fuzzy Hash: 82412A3190D7898FEB56DB28C8554B97FF1FF16300B0446EED05ACB592DA24E909C7C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523709995.00007FFAACD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACD80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacd80000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7339d2e0b5b4d3fc00f6b20eb448f33c7cf76cddd529ce19d7f0a5371435c0d5
                                                            • Instruction ID: fdb8193a7cf7afe2c0f354ccaacc49f800c8ca1ac9c34e17a1c2c962df963fac
                                                            • Opcode Fuzzy Hash: 7339d2e0b5b4d3fc00f6b20eb448f33c7cf76cddd529ce19d7f0a5371435c0d5
                                                            • Instruction Fuzzy Hash: 17E0E530A046288ADB64DB58CC81BE9B3B1EB85200F0041E6D44DA7241CA306A848F42
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 572d70e3de72e639acd6e8f1c671b1b620f9cd5a047ade7f32abd7919ed79322
                                                            • Instruction ID: 5351fd814f9e892ac6ecc222a00821eb479043de7094d580dc4a119a356579e7
                                                            • Opcode Fuzzy Hash: 572d70e3de72e639acd6e8f1c671b1b620f9cd5a047ade7f32abd7919ed79322
                                                            • Instruction Fuzzy Hash: B312892588F7C29FD3074B7458290A07FB1AE23A11B0A42EBC0C5CF5E7D65D984EDB66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ccba38b704b841f7a26ba2f149d2bcbda1b84b0a9f99eaf17f3553631bfcc8a6
                                                            • Instruction ID: adf6bd04d486b06a68ce91d7d90c4cd07031ab7d118f827a666315fcc3c99077
                                                            • Opcode Fuzzy Hash: ccba38b704b841f7a26ba2f149d2bcbda1b84b0a9f99eaf17f3553631bfcc8a6
                                                            • Instruction Fuzzy Hash: CAB15931D1EB868FE3559F2894561B17BE1EF53710B1442FAC09EC7593DA2DE84A83C1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1523301294.00007FFAACCA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ffaacca0000_CHEMICAL SPECIFICATIONS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6298c2828754bd26744fed432cdbdf8864de94940892e706466e63dafcd36c1
                                                            • Instruction ID: aad4e76c9691bd9fbaead4b18861a6867937856a3e903285afb05b2b82ce1560
                                                            • Opcode Fuzzy Hash: d6298c2828754bd26744fed432cdbdf8864de94940892e706466e63dafcd36c1
                                                            • Instruction Fuzzy Hash: 0AA1F53191E7C68FE3168B3488660A17FA1EF53711B1842FAC4DACB5D3DA1CE84AC791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:13.3%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:15%
                                                            Total number of Nodes:20
                                                            Total number of Limit Nodes:4
                                                            execution_graph 25585 2a77e90 25586 2a77ed4 CheckRemoteDebuggerPresent 25585->25586 25587 2a77f16 25586->25587 25588 2a70848 25590 2a7084e 25588->25590 25589 2a7091b 25590->25589 25592 2a7133f 25590->25592 25594 2a71343 25592->25594 25593 2a7146e 25593->25590 25594->25593 25596 2a78c41 25594->25596 25598 2a78c4b 25596->25598 25597 2a78d01 25597->25594 25598->25597 25601 692f5e8 25598->25601 25605 692f5d8 25598->25605 25602 692f5fd 25601->25602 25603 692f812 25602->25603 25604 692fc30 GlobalMemoryStatusEx GlobalMemoryStatusEx 25602->25604 25603->25597 25604->25602 25607 692f5fd 25605->25607 25606 692f812 25606->25597 25607->25606 25608 692fc30 GlobalMemoryStatusEx GlobalMemoryStatusEx 25607->25608 25608->25607

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 127 69230f8-6923119 128 692311b-692311e 127->128 129 6923124-6923143 128->129 130 69238bf-69238c2 128->130 140 6923145-6923148 129->140 141 692315c-6923166 129->141 131 69238c4-69238e3 130->131 132 69238e8-69238ea 130->132 131->132 133 69238f1-69238f4 132->133 134 69238ec 132->134 133->128 137 69238fa-6923903 133->137 134->133 140->141 142 692314a-692315a 140->142 145 692316c-692317b 141->145 142->145 253 692317d call 6923912 145->253 254 692317d call 6923918 145->254 146 6923182-6923187 147 6923194-6923471 146->147 148 6923189-692318f 146->148 169 69238b1-69238be 147->169 170 6923477-6923526 147->170 148->137 179 6923528-692354d 170->179 180 692354f 170->180 182 6923558-692356b 179->182 180->182 184 6923571-6923593 182->184 185 6923898-69238a4 182->185 184->185 188 6923599-69235a3 184->188 185->170 186 69238aa 185->186 186->169 188->185 189 69235a9-69235b4 188->189 189->185 190 69235ba-6923690 189->190 202 6923692-6923694 190->202 203 692369e-69236ce 190->203 202->203 207 69236d0-69236d2 203->207 208 69236dc-69236e8 203->208 207->208 209 69236ea-69236ee 208->209 210 6923748-692374c 208->210 209->210 213 69236f0-692371a 209->213 211 6923752-692378e 210->211 212 6923889-6923892 210->212 224 6923790-6923792 211->224 225 692379c-69237aa 211->225 212->185 212->190 220 6923728-6923745 213->220 221 692371c-692371e 213->221 220->210 221->220 224->225 227 69237c1-69237cc 225->227 228 69237ac-69237b7 225->228 232 69237e4-69237f5 227->232 233 69237ce-69237d4 227->233 228->227 231 69237b9 228->231 231->227 237 69237f7-69237fd 232->237 238 692380d-6923819 232->238 234 69237d6 233->234 235 69237d8-69237da 233->235 234->232 235->232 239 6923801-6923803 237->239 240 69237ff 237->240 242 6923831-6923882 238->242 243 692381b-6923821 238->243 239->238 240->238 242->212 244 6923823 243->244 245 6923825-6923827 243->245 244->242 245->242 253->146 254->146
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q$$q$$q
                                                            • API String ID: 0-2069967915
                                                            • Opcode ID: a110afbb330bdd4d7e0b35da8c4aa15031313c1ccb89bf5bdf67c475a5da58fd
                                                            • Instruction ID: cdc8757ed2660bea1c8b12caec8b7979574b13a587db8a458cf16ecaba59dc6a
                                                            • Opcode Fuzzy Hash: a110afbb330bdd4d7e0b35da8c4aa15031313c1ccb89bf5bdf67c475a5da58fd
                                                            • Instruction Fuzzy Hash: CA322E35E1071A8FDB14EF75D85469DF7B6BF89300F2096A9D40AAB614EF30AD85CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 964 6927a18-6927a36 965 6927a38-6927a3b 964->965 966 6927a52-6927a55 965->966 967 6927a3d-6927a4b 965->967 968 6927a57-6927a73 966->968 969 6927a78-6927a7b 966->969 975 6927abe-6927ad4 967->975 976 6927a4d 967->976 968->969 970 6927a9c-6927a9f 969->970 971 6927a7d-6927a97 969->971 973 6927aa1-6927aab 970->973 974 6927aac-6927aae 970->974 971->970 979 6927ab0 974->979 980 6927ab5-6927ab8 974->980 984 6927ada-6927ae3 975->984 985 6927cef-6927cf9 975->985 976->966 979->980 980->965 980->975 986 6927cfa-6927d2f 984->986 987 6927ae9-6927b06 984->987 990 6927d31-6927d34 986->990 994 6927cdc-6927ce9 987->994 995 6927b0c-6927b34 987->995 992 6927de7-6927dea 990->992 993 6927d3a-6927d46 990->993 996 6927df0-6927dff 992->996 997 6928016-6928019 992->997 1000 6927d51-6927d53 993->1000 994->984 994->985 995->994 1022 6927b3a-6927b43 995->1022 1009 6927e01-6927e1c 996->1009 1010 6927e1e-6927e59 996->1010 998 692801b-6928037 997->998 999 692803c-692803e 997->999 998->999 1003 6928040 999->1003 1004 6928045-6928048 999->1004 1005 6927d55-6927d5b 1000->1005 1006 6927d6b-6927d72 1000->1006 1003->1004 1004->990 1012 692804e-6928057 1004->1012 1013 6927d5f-6927d61 1005->1013 1014 6927d5d 1005->1014 1007 6927d83 1006->1007 1008 6927d74-6927d81 1006->1008 1015 6927d88-6927d8a 1007->1015 1008->1015 1009->1010 1023 6927fea-6928000 1010->1023 1024 6927e5f-6927e70 1010->1024 1013->1006 1014->1006 1017 6927da1-6927dda 1015->1017 1018 6927d8c-6927d8f 1015->1018 1017->996 1045 6927ddc-6927de6 1017->1045 1018->1012 1022->986 1025 6927b49-6927b65 1022->1025 1023->997 1033 6927e76-6927e93 1024->1033 1034 6927fd5-6927fe4 1024->1034 1035 6927cca-6927cd6 1025->1035 1036 6927b6b-6927b95 1025->1036 1033->1034 1044 6927e99-6927f8f call 6926240 1033->1044 1034->1023 1034->1024 1035->994 1035->1022 1048 6927cc0-6927cc5 1036->1048 1049 6927b9b-6927bc3 1036->1049 1097 6927f91-6927f9b 1044->1097 1098 6927f9d 1044->1098 1048->1035 1049->1048 1055 6927bc9-6927bf7 1049->1055 1055->1048 1061 6927bfd-6927c06 1055->1061 1061->1048 1062 6927c0c-6927c3e 1061->1062 1070 6927c40-6927c44 1062->1070 1071 6927c49-6927c65 1062->1071 1070->1048 1072 6927c46 1070->1072 1071->1035 1073 6927c67-6927cbe call 6926240 1071->1073 1072->1071 1073->1035 1099 6927fa2-6927fa4 1097->1099 1098->1099 1099->1034 1100 6927fa6-6927fab 1099->1100 1101 6927fb9 1100->1101 1102 6927fad-6927fb7 1100->1102 1103 6927fbe-6927fc0 1101->1103 1102->1103 1103->1034 1104 6927fc2-6927fce 1103->1104 1104->1034
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q
                                                            • API String ID: 0-3126353813
                                                            • Opcode ID: f8833ed826cb3934ae1e8d2e9f9ac7dbc96c76f0732f0357e90e02621a9a953f
                                                            • Instruction ID: 76b9bcdd7e768d397b62919787bd92efd17e46c644c56850b20f010fe08f09c1
                                                            • Opcode Fuzzy Hash: f8833ed826cb3934ae1e8d2e9f9ac7dbc96c76f0732f0357e90e02621a9a953f
                                                            • Instruction Fuzzy Hash: CF028F30B002269FDB54DBB8D4547AEBBA6FF84310F248529D406EB758DB71ED46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $
                                                            • API String ID: 0-3993045852
                                                            • Opcode ID: ddebe325a97347640353e13023db3585c9dca54b22437a35fbc3aaba04dc4689
                                                            • Instruction ID: 87bceae4f952b8a415da8aa33a8925f4891d567782d1ef48715bb6a8cae74529
                                                            • Opcode Fuzzy Hash: ddebe325a97347640353e13023db3585c9dca54b22437a35fbc3aaba04dc4689
                                                            • Instruction Fuzzy Hash: 9622B271E002269FDF64DBA8C4806AEBBB6FF85310F268469D855EB748DB71DC41CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2226 2a77e90-2a77f14 CheckRemoteDebuggerPresent 2228 2a77f16-2a77f1c 2226->2228 2229 2a77f1d-2a77f58 2226->2229 2228->2229
                                                            APIs
                                                            • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 02A77F07
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3808929320.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_2a70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: CheckDebuggerPresentRemote
                                                            • String ID:
                                                            • API String ID: 3662101638-0
                                                            • Opcode ID: 878c9f6aa87a86edd30d5e1fb68dbb431d0a6b4f9300f6ff7f2d9d7a54a915c6
                                                            • Instruction ID: dae5a1e7bce81f1ea42a50340e371b98f6d7f251f08027897c80644a9136c4e4
                                                            • Opcode Fuzzy Hash: 878c9f6aa87a86edd30d5e1fb68dbb431d0a6b4f9300f6ff7f2d9d7a54a915c6
                                                            • Instruction Fuzzy Hash: 2A214871C00259CFDB10CF9AD984BEEFBF4AF48220F14841AE455A3340D778A944CF60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b3462b93985b8660aef7f43e639b3ad14cfc52ecdcbacf0bda7b4b8c29f67e52
                                                            • Instruction ID: a230234c3baedc80d1d85a2c2f1ad35d1dbca38ed4f38c8b894242c1b05fb1b7
                                                            • Opcode Fuzzy Hash: b3462b93985b8660aef7f43e639b3ad14cfc52ecdcbacf0bda7b4b8c29f67e52
                                                            • Instruction Fuzzy Hash: 61929734E002158FDB64DF68C188BADB7F6EB45314F6488A9D409EB769DB35ED81CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b1bdec7d5223215cb94659fb9c4947e0eedf4125e77aa6db5550b73ba93316f
                                                            • Instruction ID: b0fdd9e25efc28565f7ffd4eae1bfa2bd61e15814cec9fbc9f391bd5cad84f1e
                                                            • Opcode Fuzzy Hash: 2b1bdec7d5223215cb94659fb9c4947e0eedf4125e77aa6db5550b73ba93316f
                                                            • Instruction Fuzzy Hash: 7062AE34A002258FDB64DB68D594BADBBF6FF84314F248469E406DBB58DB31EC46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e9035bfc1dd9828dccabd4a33425858ae09acd55b39dcffad66f1d2c009e7b3
                                                            • Instruction ID: dac2d47f2f7cabaf1dcde9c294e95aaf57f6f931bf0df6c0b47642b6aa30527b
                                                            • Opcode Fuzzy Hash: 8e9035bfc1dd9828dccabd4a33425858ae09acd55b39dcffad66f1d2c009e7b3
                                                            • Instruction Fuzzy Hash: 4A326034E00215DFDB94EB68D490BAEB7B6FB88310F208529D505EB758DB35EC46CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1d358e6f2aa2a139cbbde726b891ef43c0c5561f964fdbcfaa7ed1d920e73e80
                                                            • Instruction ID: b97f9af621aac543cd0d9174d32fd36b83612908abbab1b1df716898307cf9bd
                                                            • Opcode Fuzzy Hash: 1d358e6f2aa2a139cbbde726b891ef43c0c5561f964fdbcfaa7ed1d920e73e80
                                                            • Instruction Fuzzy Hash: 5F228134E0021A8BEF64DB68D4907ADB7FAFB49314F248526E419DBB9DCA34DC81C791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 692ad58-692ad76 1 692ad78-692ad7b 0->1 2 692ad8b-692ad8e 1->2 3 692ad7d-692ad86 1->3 4 692ad90-692ad95 2->4 5 692ad98-692ad9b 2->5 3->2 4->5 6 692adaf-692adb2 5->6 7 692ad9d-692adaa 5->7 8 692adb4-692adbd 6->8 9 692adcc-692adcf 6->9 7->6 11 692adc3-692adc7 8->11 12 692af8f-692afa4 8->12 13 692ade0-692ade3 9->13 14 692add1-692add5 9->14 11->9 23 692afa6-692afbb 12->23 24 692afbd-692afc6 12->24 17 692ade5-692adf8 13->17 18 692adfd-692ae00 13->18 15 692af84-692af8e 14->15 16 692addb 14->16 16->13 17->18 19 692ae02-692ae1e 18->19 20 692ae23-692ae26 18->20 19->20 25 692af75-692af7e 20->25 26 692ae2c-692ae2e 20->26 23->24 28 692afc8-692afcb 24->28 25->8 25->15 29 692ae30 26->29 30 692ae35-692ae38 26->30 31 692afd8-692afdb 28->31 32 692afcd-692afd1 28->32 29->30 30->1 33 692ae3e-692ae62 30->33 36 692afe1-692b01c 31->36 37 692b244-692b247 31->37 35 692afd3 32->35 32->36 50 692af72 33->50 51 692ae68-692ae77 33->51 35->31 47 692b022-692b02e 36->47 48 692b20f-692b222 36->48 38 692b256-692b259 37->38 39 692b249 call 692b2b2 37->39 41 692b25b-692b277 38->41 42 692b27c-692b27f 38->42 44 692b24f-692b251 39->44 41->42 45 692b281-692b28b 42->45 46 692b28c-692b28e 42->46 44->38 54 692b290 46->54 55 692b295-692b298 46->55 59 692b030-692b049 47->59 60 692b04e-692b092 47->60 52 692b224 48->52 50->25 63 692ae79-692ae7f 51->63 64 692ae8f-692aeca call 6926240 51->64 61 692b225 52->61 54->55 55->28 56 692b29e-692b2a8 55->56 59->52 78 692b094-692b0a6 60->78 79 692b0ae-692b0ed 60->79 61->61 65 692ae83-692ae85 63->65 66 692ae81 63->66 80 692aee2-692aef9 64->80 81 692aecc-692aed2 64->81 65->64 66->64 78->79 86 692b0f3-692b1ce call 6926240 79->86 87 692b1d4-692b1e9 79->87 94 692af11-692af22 80->94 95 692aefb-692af01 80->95 83 692aed6-692aed8 81->83 84 692aed4 81->84 83->80 84->80 86->87 87->48 100 692af24-692af2a 94->100 101 692af3a-692af6b 94->101 97 692af03 95->97 98 692af05-692af07 95->98 97->94 98->94 103 692af2e-692af30 100->103 104 692af2c 100->104 101->50 103->101 104->101
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                                            • API String ID: 0-3886557441
                                                            • Opcode ID: 35533c0239850c29dcc5db163490b2d1d8d08cb897ae0ca59345189cd65f3a9f
                                                            • Instruction ID: 3d33d713e04c961ace3b478251395a887c66624442265be7f9f06b52b0af2df7
                                                            • Opcode Fuzzy Hash: 35533c0239850c29dcc5db163490b2d1d8d08cb897ae0ca59345189cd65f3a9f
                                                            • Instruction Fuzzy Hash: C6E18C31E0031A8FDB64DF68D8906AEB7F6FB85314F248529D806DB748DB35AC46CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 255 692b6e0-692b702 256 692b704-692b707 255->256 257 692b745-692b748 256->257 258 692b709-692b71e 256->258 259 692b74a-692b74e 257->259 260 692b76f-692b772 257->260 265 692ba79-692baae 258->265 269 692b724-692b740 258->269 264 692b754-692b764 259->264 259->265 261 692b774-692b778 260->261 262 692b795-692b798 260->262 261->265 266 692b77e-692b78e 261->266 267 692b9ce-692b9cf 262->267 268 692b79e-692b7a1 262->268 279 692b995-692b999 264->279 280 692b76a 264->280 281 692bab0-692bab3 265->281 266->259 282 692b790 266->282 270 692b9d4-692b9d7 267->270 271 692b7a3-692b800 call 6926240 268->271 272 692b805-692b808 268->272 269->257 270->267 276 692b9d9-692b9dc 270->276 271->272 272->267 277 692b80e-692b811 272->277 283 692b9e9-692b9ec 276->283 284 692b9de-692b9e4 276->284 285 692b813-692b828 277->285 286 692b850-692b853 277->286 279->265 288 692b99f-692b9af 279->288 280->260 289 692bab9-692bae1 281->289 290 692bd1f-692bd22 281->290 282->262 291 692b9ee-692b9f1 283->291 292 692ba4c-692ba55 283->292 284->283 285->265 312 692b82e-692b84b 285->312 296 692b865-692b868 286->296 297 692b855-692b860 286->297 288->267 310 692b9b1 288->310 349 692bae3-692bae6 289->349 350 692baeb-692bb2f 289->350 294 692bd24-692bd40 290->294 295 692bd45-692bd47 290->295 305 692b9f3-692b9f7 291->305 306 692ba05-692ba08 291->306 303 692ba30-692ba39 292->303 304 692ba57 292->304 294->295 301 692bd49 295->301 302 692bd4e-692bd51 295->302 299 692ba0a-692ba10 296->299 300 692b86e-692b871 296->300 297->296 314 692b916-692b91c 299->314 315 692ba16 299->315 319 692b883-692b886 300->319 320 692b873 300->320 301->302 302->281 321 692bd57-692bd60 302->321 303->265 318 692ba3b-692ba42 303->318 322 692ba5c-692ba5e 304->322 305->265 311 692b9fd-692ba00 305->311 306->299 313 692ba1b-692ba1e 306->313 323 692b9b6-692b9b9 310->323 311->306 312->286 326 692ba20-692ba26 313->326 327 692ba2b-692ba2e 313->327 314->265 325 692b922-692b929 314->325 315->313 328 692ba47-692ba4a 318->328 329 692b896-692b899 319->329 330 692b888-692b891 319->330 339 692b87b-692b87e 320->339 331 692ba60 322->331 332 692ba65-692ba68 322->332 334 692b9bb-692b9c4 323->334 335 692b9c9-692b9cc 323->335 337 692b92e-692b931 325->337 326->327 327->303 327->328 328->292 328->322 340 692b89b-692b8a4 329->340 341 692b8a9-692b8ac 329->341 330->329 331->332 332->256 342 692ba6e-692ba78 332->342 334->335 335->267 335->270 344 692b933-692b937 337->344 345 692b948-692b94b 337->345 339->319 340->341 346 692b8b3-692b8b6 341->346 347 692b8ae-692b8b0 341->347 344->265 351 692b93d-692b943 344->351 352 692b95c-692b95f 345->352 353 692b94d-692b951 345->353 354 692b8d8-692b8db 346->354 355 692b8b8-692b8d3 346->355 347->346 349->321 378 692bd14-692bd1e 350->378 379 692bb35-692bb3e 350->379 351->345 360 692b961-692b965 352->360 361 692b976-692b979 352->361 353->340 359 692b957 353->359 357 692b8fe-692b901 354->357 358 692b8dd-692b8f9 354->358 355->354 364 692b903-692b90c 357->364 365 692b911-692b914 357->365 358->357 359->352 360->265 366 692b96b-692b971 360->366 367 692b983-692b986 361->367 368 692b97b-692b97e 361->368 364->365 365->314 365->337 366->361 371 692b990-692b993 367->371 372 692b988-692b98d 367->372 368->367 371->279 371->323 372->371 380 692bb44-692bbb0 call 6926240 379->380 381 692bd0a-692bd0f 379->381 389 692bbb6-692bbbb 380->389 390 692bcaa-692bcbf 380->390 381->378 392 692bbd7 389->392 393 692bbbd-692bbc3 389->393 390->381 394 692bbd9-692bbdf 392->394 395 692bbc5-692bbc7 393->395 396 692bbc9-692bbcb 393->396 397 692bbe1-692bbe7 394->397 398 692bbf4-692bc01 394->398 399 692bbd5 395->399 396->399 400 692bc95-692bca4 397->400 401 692bbed 397->401 406 692bc03-692bc09 398->406 407 692bc19-692bc26 398->407 399->394 400->389 400->390 401->398 402 692bc28-692bc35 401->402 403 692bc5c-692bc69 401->403 413 692bc37-692bc3d 402->413 414 692bc4d-692bc5a 402->414 415 692bc81-692bc8e 403->415 416 692bc6b-692bc71 403->416 408 692bc0b 406->408 409 692bc0d-692bc0f 406->409 407->400 408->407 409->407 417 692bc41-692bc43 413->417 418 692bc3f 413->418 414->400 415->400 419 692bc73 416->419 420 692bc75-692bc77 416->420 417->414 418->414 419->415 420->415
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q$$q$$q
                                                            • API String ID: 0-2069967915
                                                            • Opcode ID: d1fab1d6121931ac978bdbb88b8a5bcbf6c901fb9ee4431f95c14cd32fabcce3
                                                            • Instruction ID: 858271cb44d70406e5c1aa9c451961cebe53726d2c58a2a207725e86517b02e9
                                                            • Opcode Fuzzy Hash: d1fab1d6121931ac978bdbb88b8a5bcbf6c901fb9ee4431f95c14cd32fabcce3
                                                            • Instruction Fuzzy Hash: C7025E30E1022A8FDB64DB68D4807ADB7F5FB45318F248526D419DBA5DDB30EC85CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 423 69291e0-6929205 424 6929207-692920a 423->424 425 6929210-6929225 424->425 426 6929ac8-6929acb 424->426 433 6929227-692922d 425->433 434 692923d-6929253 425->434 427 6929af1-6929af3 426->427 428 6929acd-6929aec 426->428 429 6929af5 427->429 430 6929afa-6929afd 427->430 428->427 429->430 430->424 432 6929b03-6929b0d 430->432 436 6929231-6929233 433->436 437 692922f 433->437 440 692925e-6929260 434->440 436->434 437->434 441 6929262-6929268 440->441 442 6929278-69292e9 440->442 443 692926a 441->443 444 692926c-692926e 441->444 453 6929315-6929331 442->453 454 69292eb-692930e 442->454 443->442 444->442 459 6929333-6929356 453->459 460 692935d-6929378 453->460 454->453 459->460 465 69293a3-69293be 460->465 466 692937a-692939c 460->466 471 69293e3-69293f1 465->471 472 69293c0-69293dc 465->472 466->465 473 69293f3-69293fc 471->473 474 6929401-692947b 471->474 472->471 473->432 480 69294c8-69294dd 474->480 481 692947d-692949b 474->481 480->426 485 69294b7-69294c6 481->485 486 692949d-69294ac 481->486 485->480 485->481 486->485
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q
                                                            • API String ID: 0-4102054182
                                                            • Opcode ID: 6de479a96c1e686104fb633bd7a2536a12b1b7b98447ab9fea08626a97900e5e
                                                            • Instruction ID: 6ebbea7c0ec408db78f9012615ad44b10fc991a96d0aa28e5f928b0b2f00b00b
                                                            • Opcode Fuzzy Hash: 6de479a96c1e686104fb633bd7a2536a12b1b7b98447ab9fea08626a97900e5e
                                                            • Instruction Fuzzy Hash: A2915370F0061A8FDB54DB69D8607AE7BB6BF89300F108565D81AEB748EF70DD428B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 489 692cfd0-692cfeb 490 692cfed-692cff0 489->490 491 692cff6-692cff9 490->491 492 692d4bc-692d4c8 490->492 495 692cffb-692d017 491->495 496 692d01c-692d01f 491->496 493 692d170-692d17f 492->493 494 692d4ce-692d7bb 492->494 499 692d181-692d186 493->499 500 692d18e-692d19a 493->500 704 692d9e2-692d9ec 494->704 705 692d7c1-692d7c7 494->705 495->496 497 692d021-692d063 496->497 498 692d068-692d06b 496->498 497->498 501 692d075-692d078 498->501 502 692d06d-692d072 498->502 499->500 505 692d1a0-692d1b2 500->505 506 692d9ed-692da04 500->506 507 692d0c1-692d0c4 501->507 508 692d07a-692d0bc 501->508 502->501 516 692d1b7-692d1ba 505->516 519 692da06-692da0d 506->519 520 692da0e-692da26 506->520 513 692d0c6-692d108 507->513 514 692d10d-692d110 507->514 508->507 513->514 521 692d112-692d154 514->521 522 692d159-692d15c 514->522 524 692d1d7-692d1da 516->524 525 692d1bc-692d1d2 516->525 519->520 528 692da28-692da2b 520->528 521->522 526 692d16b-692d16e 522->526 527 692d15e-692d160 522->527 531 692d223-692d226 524->531 532 692d1dc-692d21e 524->532 525->524 526->493 526->516 533 692d166 527->533 534 692d377-692d380 527->534 536 692da4e-692da51 528->536 537 692da2d-692da49 528->537 544 692d228-692d26a 531->544 545 692d26f-692d272 531->545 532->531 533->526 546 692d382-692d387 534->546 547 692d38f-692d39b 534->547 541 692da53-692da7f 536->541 542 692da84-692da87 536->542 537->536 541->542 552 692da96-692da98 542->552 553 692da89 call 692db45 542->553 544->545 550 692d274-692d2b6 545->550 551 692d2bb-692d2be 545->551 546->547 554 692d3a1-692d3b5 547->554 555 692d4ac-692d4b1 547->555 550->551 565 692d2c0-692d2cf 551->565 566 692d307-692d30a 551->566 563 692da9a 552->563 564 692da9f-692daa2 552->564 574 692da8f-692da91 553->574 586 692d3bb-692d3cd 554->586 587 692d4b9 554->587 555->587 563->564 564->528 575 692daa4-692dab3 564->575 578 692d2d1-692d2d6 565->578 579 692d2de-692d2ea 565->579 568 692d353-692d356 566->568 569 692d30c-692d34e 566->569 582 692d365-692d367 568->582 583 692d358-692d35a 568->583 569->568 574->552 602 692dab5-692db18 call 6926240 575->602 603 692db1a-692db2f 575->603 578->579 579->506 588 692d2f0-692d302 579->588 593 692d369 582->593 594 692d36e-692d371 582->594 583->587 592 692d360 583->592 609 692d3f1-692d3f3 586->609 610 692d3cf-692d3d5 586->610 587->492 588->566 592->582 593->594 594->490 594->534 602->603 622 692db30 603->622 620 692d3fd-692d409 609->620 615 692d3d7 610->615 616 692d3d9-692d3e5 610->616 618 692d3e7-692d3ef 615->618 616->618 618->620 633 692d417 620->633 634 692d40b-692d415 620->634 622->622 636 692d41c-692d41e 633->636 634->636 636->587 639 692d424-692d440 call 6926240 636->639 648 692d442-692d447 639->648 649 692d44f-692d45b 639->649 648->649 649->555 652 692d45d-692d4aa 649->652 652->587 706 692d7d6-692d7df 705->706 707 692d7c9-692d7ce 705->707 706->506 708 692d7e5-692d7f8 706->708 707->706 710 692d9d2-692d9dc 708->710 711 692d7fe-692d804 708->711 710->704 710->705 712 692d813-692d81c 711->712 713 692d806-692d80b 711->713 712->506 714 692d822-692d843 712->714 713->712 717 692d852-692d85b 714->717 718 692d845-692d84a 714->718 717->506 719 692d861-692d87e 717->719 718->717 719->710 722 692d884-692d88a 719->722 722->506 723 692d890-692d8a9 722->723 725 692d9c5-692d9cc 723->725 726 692d8af-692d8d6 723->726 725->710 725->722 726->506 729 692d8dc-692d8e6 726->729 729->506 730 692d8ec-692d903 729->730 732 692d912-692d92d 730->732 733 692d905-692d910 730->733 732->725 738 692d933-692d94c call 6926240 732->738 733->732 742 692d95b-692d964 738->742 743 692d94e-692d953 738->743 742->506 744 692d96a-692d9be 742->744 743->742 744->725
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q
                                                            • API String ID: 0-3067366958
                                                            • Opcode ID: b40407e519bd25f3b156cdb6cac95a4c25b75a8657a56766591688b6d96baf54
                                                            • Instruction ID: 04bc96d0ee48664590f7f2b2146ac63ab250b3a8cfc0deb96e6396bd5c23bc59
                                                            • Opcode Fuzzy Hash: b40407e519bd25f3b156cdb6cac95a4c25b75a8657a56766591688b6d96baf54
                                                            • Instruction Fuzzy Hash: 47624E34A002268FDB55EF68D590A9EB7B2FF84304B248A28D405DF759DB71EC4ACB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 752 69247f8-692481c 754 692481e-6924821 752->754 755 6924f00-6924f03 754->755 756 6924827-692491f 754->756 757 6924f24-6924f26 755->757 758 6924f05-6924f1f 755->758 776 69249a2-69249a9 756->776 777 6924925-6924972 call 69250a2 756->777 760 6924f28 757->760 761 6924f2d-6924f30 757->761 758->757 760->761 761->754 763 6924f36-6924f43 761->763 778 69249af-6924a1f 776->778 779 6924a2d-6924a36 776->779 790 6924978-6924994 777->790 796 6924a21 778->796 797 6924a2a 778->797 779->763 793 6924996 790->793 794 692499f 790->794 793->794 794->776 796->797 797->779
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fq$XPq$\Oq
                                                            • API String ID: 0-132346853
                                                            • Opcode ID: d9e5d35236aeaa544610d866d2d2627e3620993836983fe0d1ba66e7b340b68e
                                                            • Instruction ID: 7c8b9cd3e422cbcf72b82213fcf1b7d98266ac358a6668042f4954cab2261837
                                                            • Opcode Fuzzy Hash: d9e5d35236aeaa544610d866d2d2627e3620993836983fe0d1ba66e7b340b68e
                                                            • Instruction Fuzzy Hash: EA617034F002199FEB549BA4C8147AEBAF6FF88700F248529E106EB398DB718C458B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1618 692a430-692a431 1619 692a433-692a460 1618->1619 1620 692a3bd-692a3c1 1618->1620 1621 692a462-692a465 1619->1621 1624 692a3c8 1620->1624 1622 692a467-692a475 1621->1622 1623 692a47c-692a47f 1621->1623 1625 692a485-692a51e call 6922128 1622->1625 1633 692a477 1622->1633 1623->1625 1626 692a52b-692a52e 1623->1626 1627 692a3cd-692a3d0 1624->1627 1638 692a55a-692a587 call 6922128 1625->1638 1675 692a520-692a52a 1625->1675 1631 692a530-692a54c 1626->1631 1632 692a551-692a554 1626->1632 1628 692a3f2-692a3f5 1627->1628 1629 692a3d2-692a3d8 call 692a430 1627->1629 1634 692a417-692a419 1628->1634 1635 692a3f7-692a412 1628->1635 1639 692a3de-692a3ed 1629->1639 1631->1632 1637 692a685-692a688 1632->1637 1632->1638 1633->1623 1643 692a420-692a423 1634->1643 1644 692a41b 1634->1644 1635->1634 1641 692a695-692a698 1637->1641 1642 692a68a-692a694 1637->1642 1670 692a67a-692a684 1638->1670 1671 692a58d-692a5b2 1638->1671 1639->1628 1647 692a69a 1641->1647 1648 692a6b8-692a6ba 1641->1648 1649 692a425-692a429 1643->1649 1650 692a3a8-692a3ab 1643->1650 1644->1643 1661 692a6a4-692a6b3 1647->1661 1652 692a6c1-692a6c4 1648->1652 1653 692a6bc 1648->1653 1650->1627 1655 692a3ad-692a3c1 1650->1655 1652->1621 1658 692a6ca-692a6d3 1652->1658 1653->1652 1655->1624 1661->1648 1677 692a5b4-692a5ba 1671->1677 1678 692a5bc 1671->1678 1679 692a5c2-692a674 call 6926240 call 6922128 1677->1679 1678->1679 1679->1670 1679->1671
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: X!@$x!@
                                                            • API String ID: 0-2527372166
                                                            • Opcode ID: a9107e0b5496ea2499887db4b479afcf80c2f7b5802f6cf75c455462a0ac0f67
                                                            • Instruction ID: bdac49e1da193b62ffe914dd3702ed6ca8350cbb84701e1bb6f99d85edfb63b9
                                                            • Opcode Fuzzy Hash: a9107e0b5496ea2499887db4b479afcf80c2f7b5802f6cf75c455462a0ac0f67
                                                            • Instruction Fuzzy Hash: EC81E335F002259FDB55EB68E89069DB7B6FF88310F208529E50AEB748DB31DC46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1947 69291cf-69291d9 1948 69291db-69291dc 1947->1948 1948->1948 1949 69291de-6929205 1948->1949 1950 6929207-692920a 1949->1950 1951 6929210-6929225 1950->1951 1952 6929ac8-6929acb 1950->1952 1959 6929227-692922d 1951->1959 1960 692923d-6929253 1951->1960 1953 6929af1-6929af3 1952->1953 1954 6929acd-6929aec 1952->1954 1955 6929af5 1953->1955 1956 6929afa-6929afd 1953->1956 1954->1953 1955->1956 1956->1950 1958 6929b03-6929b0d 1956->1958 1962 6929231-6929233 1959->1962 1963 692922f 1959->1963 1966 692925e-6929260 1960->1966 1962->1960 1963->1960 1967 6929262-6929268 1966->1967 1968 6929278-69292e9 1966->1968 1969 692926a 1967->1969 1970 692926c-692926e 1967->1970 1979 6929315-6929331 1968->1979 1980 69292eb-692930e 1968->1980 1969->1968 1970->1968 1985 6929333-6929356 1979->1985 1986 692935d-6929378 1979->1986 1980->1979 1985->1986 1991 69293a3-69293be 1986->1991 1992 692937a-692939c 1986->1992 1997 69293e3-69293f1 1991->1997 1998 69293c0-69293dc 1991->1998 1992->1991 1999 69293f3-69293fc 1997->1999 2000 6929401-692947b 1997->2000 1998->1997 1999->1958 2006 69294c8-69294dd 2000->2006 2007 692947d-692949b 2000->2007 2006->1952 2011 69294b7-69294c6 2007->2011 2012 692949d-69294ac 2007->2012 2011->2006 2011->2007 2012->2011
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q
                                                            • API String ID: 0-3126353813
                                                            • Opcode ID: 38893b33c05ba024aa2c72b476cf989e8fc642e10aeb2b8134be564993b89a73
                                                            • Instruction ID: bd06fa8224cf10e824b9b01c0b98180e1694f8e7441394ab068769a0362b5360
                                                            • Opcode Fuzzy Hash: 38893b33c05ba024aa2c72b476cf989e8fc642e10aeb2b8134be564993b89a73
                                                            • Instruction Fuzzy Hash: D5516174F002159FDB54DB79D860BAE7BF6BF88300F108569D81AEB748EA70DC428B90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2196 2a7f3c0-2a7f3db 2197 2a7f405-2a7f41b 2196->2197 2198 2a7f3dd-2a7f404 2196->2198 2218 2a7f41d call 2a7f3c0 2197->2218 2219 2a7f41d call 2a7f4a8 2197->2219 2201 2a7f422-2a7f424 2202 2a7f426-2a7f429 2201->2202 2203 2a7f42a-2a7f489 2201->2203 2210 2a7f48f-2a7f51c GlobalMemoryStatusEx 2203->2210 2211 2a7f48b-2a7f48e 2203->2211 2214 2a7f525-2a7f54d 2210->2214 2215 2a7f51e-2a7f524 2210->2215 2215->2214 2218->2201 2219->2201
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3808929320.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_2a70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1a71428ef2b8bd953742b644a5929460d93c5587bfce9e3a03091aa8aa8bdaff
                                                            • Instruction ID: ab549e9924e188e59f168c29d77a2d79ae857f9e231b1ac4778050585b7fcd59
                                                            • Opcode Fuzzy Hash: 1a71428ef2b8bd953742b644a5929460d93c5587bfce9e3a03091aa8aa8bdaff
                                                            • Instruction Fuzzy Hash: 4A414331E043868FCB14CF69C84069EBBF1EF89310F1985AAD449E7291DB349945CBE1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2220 2a77e88-2a77f14 CheckRemoteDebuggerPresent 2222 2a77f16-2a77f1c 2220->2222 2223 2a77f1d-2a77f58 2220->2223 2222->2223
                                                            APIs
                                                            • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 02A77F07
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3808929320.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_2a70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: CheckDebuggerPresentRemote
                                                            • String ID:
                                                            • API String ID: 3662101638-0
                                                            • Opcode ID: 4c39950e3096843961a7d285ce378e89182313f8013dec82820e9255c1af3b66
                                                            • Instruction ID: a805e751b3fd87c8228cf9d69557fbcb18d6dab728041acf3a933c9bd81040ec
                                                            • Opcode Fuzzy Hash: 4c39950e3096843961a7d285ce378e89182313f8013dec82820e9255c1af3b66
                                                            • Instruction Fuzzy Hash: 132136B6C00259CFDB10CF9AD985BEEBBF4AF48211F14841AE455B3350D7389A44CF60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32 ref: 02A7F50F
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3808929320.0000000002A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A70000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_2a70000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 08da5d4d40c422a8909d2d08fb6567f102047b467c063f6031ae326e48009e2f
                                                            • Instruction ID: 652aea4ec0167eb02f10095bd154960486c9c2277fbeb9ddf2e0f7acde343722
                                                            • Opcode Fuzzy Hash: 08da5d4d40c422a8909d2d08fb6567f102047b467c063f6031ae326e48009e2f
                                                            • Instruction Fuzzy Hash: BA1126B1C0065A9FDB20CF9AC944BDEFBF4EF48320F14816AD818A7240D778A945CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: XPq
                                                            • API String ID: 0-1601936878
                                                            • Opcode ID: 9045408df14ba668691c7399ecbe82b79b97e883f7143f3ed7c93483e8f9ff00
                                                            • Instruction ID: 216b60bb14a72754c5599e82f339e4ea58ae164b9f466e8d69eee9de002c556a
                                                            • Opcode Fuzzy Hash: 9045408df14ba668691c7399ecbe82b79b97e883f7143f3ed7c93483e8f9ff00
                                                            • Instruction Fuzzy Hash: 28415E74F002199FEB549FA5C814B9EBBF6BF88700F248529E146AB398DB719C05CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq
                                                            • API String ID: 0-3820536768
                                                            • Opcode ID: 411e5c2fc105c202497d610350c475fc93e11ca3378aff6b80fa7e700243503e
                                                            • Instruction ID: ee98a5d1508146cee2173c80954bb19d5ff29fbbd178ddaa6e1b098ccb6bfcb2
                                                            • Opcode Fuzzy Hash: 411e5c2fc105c202497d610350c475fc93e11ca3378aff6b80fa7e700243503e
                                                            • Instruction Fuzzy Hash: 71419034E0071A8FEF64DF65C45469EBBB6FF85700F20492AE405EB648DB71E84ACB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq
                                                            • API String ID: 0-3820536768
                                                            • Opcode ID: 7bc405abda21e9393045cc2e71f45653c00f4c7c0e410eeffd994b6f4aa0946f
                                                            • Instruction ID: 0aa210d718e2533ae9d780114a9d5fcff0280e28abec1da3aeefb1838379d17d
                                                            • Opcode Fuzzy Hash: 7bc405abda21e9393045cc2e71f45653c00f4c7c0e410eeffd994b6f4aa0946f
                                                            • Instruction Fuzzy Hash: 5031AD30B002168FDB68AF75D46476E7AE7BF89A00F244569E406DB388DE35DD0ACB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: |
                                                            • API String ID: 0-2343686810
                                                            • Opcode ID: c38e95c326c89c5a4d437ca31fd98a0ed5d86383b6cb86983adc401dc583ce98
                                                            • Instruction ID: 51f61965ea2b49a002c216b91a2e2a54f3095fd787e7ba434b8b4ada272ddc84
                                                            • Opcode Fuzzy Hash: c38e95c326c89c5a4d437ca31fd98a0ed5d86383b6cb86983adc401dc583ce98
                                                            • Instruction Fuzzy Hash: A5113A74B402249FDB54DF78D804BAE7BF2AF88710F144469EA4AEB394DB359D01CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: |
                                                            • API String ID: 0-2343686810
                                                            • Opcode ID: 88ba5bbd48fa507d487dc2c7f57c20a759550a0af31203cd3a9fcad4783935c4
                                                            • Instruction ID: 00a9353e68d63485cf5c9b0acd479bda483197317f794edc21c2520996ea1539
                                                            • Opcode Fuzzy Hash: 88ba5bbd48fa507d487dc2c7f57c20a759550a0af31203cd3a9fcad4783935c4
                                                            • Instruction Fuzzy Hash: 05113D75B402249FDB54DF78D804BAE7BF6AF48700F148469EA0AEB3A5DB359D01CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6b34a3bf172eab54069c65dadf6062e85b4d01ee6076a93e3189ca8499ed4fa
                                                            • Instruction ID: bb4b23103ffd5ca10cc02a728e1b13a3e2dbfa6d3c942d1c16b71bae6b20c484
                                                            • Opcode Fuzzy Hash: b6b34a3bf172eab54069c65dadf6062e85b4d01ee6076a93e3189ca8499ed4fa
                                                            • Instruction Fuzzy Hash: C2618571F001214FDF549B7ED8806AFBADBAF84214B254439E40ADB368DEB5ED4287D2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1f65cd56d716fac3b9edb946f8431a026691793b04282ba33afca75cc43d5587
                                                            • Instruction ID: 794e04e1659ac208fe8fb5f2b1670f492c424f96b7af4d827864f18ea0369c7b
                                                            • Opcode Fuzzy Hash: 1f65cd56d716fac3b9edb946f8431a026691793b04282ba33afca75cc43d5587
                                                            • Instruction Fuzzy Hash: 61914034E1021A8BDF60DF68C850B9DBBB5FF89300F208699D549FB645DB70A986CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dd772d31ecd7260265a33185ea33fb2a432f115b534f7a68c43bd10bb8ae27cf
                                                            • Instruction ID: 487cabe8babdbe9dc006f65ab4b69092b5ede1e4615af09fa369320fa1ba8205
                                                            • Opcode Fuzzy Hash: dd772d31ecd7260265a33185ea33fb2a432f115b534f7a68c43bd10bb8ae27cf
                                                            • Instruction Fuzzy Hash: 47815134B006198FDB54DFA9D4647AEBBF6AF89300F248528D40ADB789DF34DC428B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74a9a9d801f5ae4bb6fe56d53e3ab1890deb31d44d64ebc7d9eabbb65b06d22b
                                                            • Instruction ID: cd444e67443284655280e33cf96455998918256b1deca7065e951e53b7a5700c
                                                            • Opcode Fuzzy Hash: 74a9a9d801f5ae4bb6fe56d53e3ab1890deb31d44d64ebc7d9eabbb65b06d22b
                                                            • Instruction Fuzzy Hash: F4911C34E1061A8BDF60DF68C880B9DB7B5FF89310F208699D549BB345DB70AA85CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7790b393e73f5c280b055f6a791b17adbe3998b1c66f614f054f23236d9c0895
                                                            • Instruction ID: 68fd2e563f90af6d55a2d650d308aeae4687a2d26997963a00cde573cd33b734
                                                            • Opcode Fuzzy Hash: 7790b393e73f5c280b055f6a791b17adbe3998b1c66f614f054f23236d9c0895
                                                            • Instruction Fuzzy Hash: 4F813C34A002199FDB54DFA9D980AADBBF6FF88300F248429E445EB759DB30EC46CB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8f0cd69ac192df4f2884f092fb5b0c61597380b2f49fb5f83a605edfcc95fe72
                                                            • Instruction ID: 909068c0258375285df842a38c18582c53b96d99d138eba1d5f0e5352f97a072
                                                            • Opcode Fuzzy Hash: 8f0cd69ac192df4f2884f092fb5b0c61597380b2f49fb5f83a605edfcc95fe72
                                                            • Instruction Fuzzy Hash: 5D712A34A0021A9FDB54DFA9D980AADBBF6FF84300F248429D415EB759DB30EC46CB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a028e984ef8b6f2eb6f5632891c88fc57310c1a17dc83285d683bdd6fddbf904
                                                            • Instruction ID: f1f8ca40d08b5873075d8a3f3260a2b6bd09d84fd58c1836fb26aaad2b36270b
                                                            • Opcode Fuzzy Hash: a028e984ef8b6f2eb6f5632891c88fc57310c1a17dc83285d683bdd6fddbf904
                                                            • Instruction Fuzzy Hash: 4451E231E401169FDF68EB78E8546ADB7B6FF88311F20886AE506D7658DB358C46CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3b7a131e8ffc5c6ac2eb8b545b6d12e5c1dff0832f0eaa8731e94cc831d5b113
                                                            • Instruction ID: 8d22d376f95515577cf7a1acedea5cabd3fc9a23498acb3cac8deb6d8d12fe31
                                                            • Opcode Fuzzy Hash: 3b7a131e8ffc5c6ac2eb8b545b6d12e5c1dff0832f0eaa8731e94cc831d5b113
                                                            • Instruction Fuzzy Hash: F651D335F002158FDF55EB68E854BAE77B6FB88314F204529D506EB748DB319D428B90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c66cd4fc9c4701b7437c4b0402a022ff559c337c81b2c5d19677b1adfaf57f1d
                                                            • Instruction ID: 45539f2e080ccef44ee3f93c3bce9b529e498cc3443de3f9848cd8319f39151a
                                                            • Opcode Fuzzy Hash: c66cd4fc9c4701b7437c4b0402a022ff559c337c81b2c5d19677b1adfaf57f1d
                                                            • Instruction Fuzzy Hash: B051D674F502255BEFB066A8D89476F3A6ED789310F30442AE40BD779DDB38CC4297A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ae075805156ae0947314a5f41f187a84d93b014953c8888a1ab9a3862cb901e1
                                                            • Instruction ID: 612304eeba9b838c441cd8407a106a446d10673759defb366616739be04d00f6
                                                            • Opcode Fuzzy Hash: ae075805156ae0947314a5f41f187a84d93b014953c8888a1ab9a3862cb901e1
                                                            • Instruction Fuzzy Hash: C851D434F502255BFFA06668D89476F3A6EE789310F30442AE00BD7798DB39DC4297A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 476b6162ee16f8864322593b9d2af809193da0cbd65bf50f0ab47f65a06aaee5
                                                            • Instruction ID: 362e17335d25bd79afa8d46def8a1b1e8dec1286309eda60aeac17fe040e7046
                                                            • Opcode Fuzzy Hash: 476b6162ee16f8864322593b9d2af809193da0cbd65bf50f0ab47f65a06aaee5
                                                            • Instruction Fuzzy Hash: 9D418E31E0021A9FDB70CFA9DC80AAFF7B6FB85310F21492AE155D7A45D630E8858B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c00b1bdd62999780765ba624135c7cc926d5a42d24d68381914e2ca6722d895c
                                                            • Instruction ID: f0c527649883e3e9cee203b1f2db214b1260337868037cfb837d3bfec1fa1944
                                                            • Opcode Fuzzy Hash: c00b1bdd62999780765ba624135c7cc926d5a42d24d68381914e2ca6722d895c
                                                            • Instruction Fuzzy Hash: FA41E175E003589FDB50DFA9E840BEEBFF4EB49320F14816AE856E7695D7389840CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 935fd45d00ee866d18f55d1a17805810f5a3e71ca174133705c6ab19df2e0927
                                                            • Instruction ID: b0df93fead0dd10c63c65d1559ea8eb7bd15d4ee1d9af8762c48d2c147e99876
                                                            • Opcode Fuzzy Hash: 935fd45d00ee866d18f55d1a17805810f5a3e71ca174133705c6ab19df2e0927
                                                            • Instruction Fuzzy Hash: 7C41C471E002169FDF64DFA8C480B7EFBB6FB44300F668529D559DB64AC634E851CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c7b3396348bd5a902377edfc0a06a9229f490b8b9ba15a4c0272f63bc2723d90
                                                            • Instruction ID: c61512af96455ce0777d618e0b0ecf94d63f39e5ca583a3b35eea97817db8fb3
                                                            • Opcode Fuzzy Hash: c7b3396348bd5a902377edfc0a06a9229f490b8b9ba15a4c0272f63bc2723d90
                                                            • Instruction Fuzzy Hash: 2D317434E1072A8BDF25DF65D490A9EB7B6EF85310F204929E405EB748DB70ED4A8B81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 14bb36ef9bad26e79b133bbc670a57ed4aab68f7ac8412316193604620d1c0da
                                                            • Instruction ID: f8fb913f3aad6afda9e8af41f5649e90c08861ca0991eb02ec5204279f445730
                                                            • Opcode Fuzzy Hash: 14bb36ef9bad26e79b133bbc670a57ed4aab68f7ac8412316193604620d1c0da
                                                            • Instruction Fuzzy Hash: BB31D034E102169FCB18DF64D85469EB7B2FF89300F108519E906EB754DB71ED86CB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4036aab5bb76a08b1a5d53f9104a1ec8f59541220e00d7aabc1a3534c6ad61ed
                                                            • Instruction ID: cbccc797e1ce14527a2c8e721dae34b7fa55164d80a52a7f6c990dfcdd0024e5
                                                            • Opcode Fuzzy Hash: 4036aab5bb76a08b1a5d53f9104a1ec8f59541220e00d7aabc1a3534c6ad61ed
                                                            • Instruction Fuzzy Hash: 93212932F101265FDF949A68EC507AE77AAEBC9320F204839D546DB748DB20DC4687D1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 02ca8ff91f0c77240712ee48c0a7dcce7a90c7d46d004399a730d20585cf7425
                                                            • Instruction ID: 984fb81d8e4031eaabe3e18676e549b5dd395b6601606ccf6d62338dbda94929
                                                            • Opcode Fuzzy Hash: 02ca8ff91f0c77240712ee48c0a7dcce7a90c7d46d004399a730d20585cf7425
                                                            • Instruction Fuzzy Hash: CB31A034E106169FCB18DF64C854A9EB7B6FF89300F208529E906EB758DB71ED86CB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 628bc05a9c3f8153b6ee600dbde911b7e7a2b77bb6f0fbac6c973495f242e266
                                                            • Instruction ID: 7c129799e7f46a1ce7cb43f8b52ca7e07f34f0d16c20eeb2ed050864ff1a1bac
                                                            • Opcode Fuzzy Hash: 628bc05a9c3f8153b6ee600dbde911b7e7a2b77bb6f0fbac6c973495f242e266
                                                            • Instruction Fuzzy Hash: 0221EB32B102258FCB51DB78D850BAEB7E6FF89314B20846DE406D7649DA32DC418790
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5c44a820c7ea5d1e1500b9d61b5f115e4800b8d4b99fa6be306b592677258ff1
                                                            • Instruction ID: 9da0db0753c91f8d4c3b89d80878407d2187fcbfc24dd1b18d2f61f440a4c47b
                                                            • Opcode Fuzzy Hash: 5c44a820c7ea5d1e1500b9d61b5f115e4800b8d4b99fa6be306b592677258ff1
                                                            • Instruction Fuzzy Hash: 71216B75F006299FDB50DF69E850BAEBBF5BB48710F108069E905E7789EB34DD408B90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3808241538.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_107d000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7df5c0fbb660549e3205080cca10493578b9fc3688bc22e41e96f93714f4a581
                                                            • Instruction ID: f2fee6ac80f2d4ccc91c046d0039c25444d2437ce399aaaa5175be25b3b1e7aa
                                                            • Opcode Fuzzy Hash: 7df5c0fbb660549e3205080cca10493578b9fc3688bc22e41e96f93714f4a581
                                                            • Instruction Fuzzy Hash: 02212571A04240DFDB16DF94D9C0B16BBA1EF84314F24C5ADE8894B242C336D447CBA6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3808241538.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_107d000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9e91e49fec58b5841a494d7cf6019f302e3ba590eb5c6fa7176d6a7163be071a
                                                            • Instruction ID: dde307c2c3ba2d0e3cfda5337446aabc34f3016903841be72ab9944479cadf91
                                                            • Opcode Fuzzy Hash: 9e91e49fec58b5841a494d7cf6019f302e3ba590eb5c6fa7176d6a7163be071a
                                                            • Instruction Fuzzy Hash: 48214B755093C09FCB07CB64D994711BFB1AF46214F2985DBD8888F2A7C33A985ACB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b4f3cdcd663d59bb0c85f54a5e8a6094a636bf6a8f220afc16c35ab7e1b5ed1a
                                                            • Instruction ID: d7bdf5678c03461c5898dd732155789fefd20babf69ff7e1cf5b428cede59fcb
                                                            • Opcode Fuzzy Hash: b4f3cdcd663d59bb0c85f54a5e8a6094a636bf6a8f220afc16c35ab7e1b5ed1a
                                                            • Instruction Fuzzy Hash: 5011F5357102620FD7619A7D945076BBBEADFCA310F248479E18ECB789DA65DC0283A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06b6890fe1f5091fe41b9b06167c421f9a91256b6b01ff38503bf5eb3c2dcaa4
                                                            • Instruction ID: ef3e2afd2d061bc941fe184dd87f5606f887065c5dd6c3644489e306f1050b97
                                                            • Opcode Fuzzy Hash: 06b6890fe1f5091fe41b9b06167c421f9a91256b6b01ff38503bf5eb3c2dcaa4
                                                            • Instruction Fuzzy Hash: DF118E31B105255FDF549A79D8246AE7BEAABC8710F108579D806E7348DE38DC018791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e71cfc70c13d8d0e48d73e4ef084cfd1f0a6c9063f9a1e1216ad8cd566ab802b
                                                            • Instruction ID: be9eddd05d667a6087f12990a90b925e3f1f6fc52263f20e80cabd5f78a4e445
                                                            • Opcode Fuzzy Hash: e71cfc70c13d8d0e48d73e4ef084cfd1f0a6c9063f9a1e1216ad8cd566ab802b
                                                            • Instruction Fuzzy Hash: 7E21EFB5D00259EFCB10CF9AD884A9EFFB4FB49310F10852AE958A7340C3746954CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a1d1301b8ffb0557cd0bfb7b7a127badab4fe70078aa4c50c3db3f828ddc0d61
                                                            • Instruction ID: 75406e089d2d200f7ea65a700260da276599bc20dd84663ac526d820428f83f0
                                                            • Opcode Fuzzy Hash: a1d1301b8ffb0557cd0bfb7b7a127badab4fe70078aa4c50c3db3f828ddc0d61
                                                            • Instruction Fuzzy Hash: 97019E32B100265BDF949979DC247EFBBAAABC8710F104179D506D7288EE28DC0187E1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 006f5b805a652ce8a8660db7df5ca10acf21ab0a5e2db1f0dd8759ce915557df
                                                            • Instruction ID: aedc3a6db487f0174dbfd12de2a494709941cde29e79d258c14d4c16d747b21f
                                                            • Opcode Fuzzy Hash: 006f5b805a652ce8a8660db7df5ca10acf21ab0a5e2db1f0dd8759ce915557df
                                                            • Instruction Fuzzy Hash: 98018B35B105214FDB619A38A4A477E6BDBEBC9210F248839E50ECB748DA25DC034395
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7648d36c2688df48c0d8a3a921db8017f5f2c3b885cd28f045ca021b9d64e2f0
                                                            • Instruction ID: ada24a29e4beaf993a3095a058dc4668040d88d4689f390d3d29c8c5b95d5343
                                                            • Opcode Fuzzy Hash: 7648d36c2688df48c0d8a3a921db8017f5f2c3b885cd28f045ca021b9d64e2f0
                                                            • Instruction Fuzzy Hash: FD11D3B5D01259DFCB10CF9AD984ADEFBB4FB49314F10812AE918A7340C7746954CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c998f8cf1d228b50f0982c0432931d3e8a1acd720cc79e5cb52a8756a19e4cfc
                                                            • Instruction ID: 4e2703e95fdfbde93b938a7320a02a6ae838d8b689a9a52fbecbb2dc1d7f36d8
                                                            • Opcode Fuzzy Hash: c998f8cf1d228b50f0982c0432931d3e8a1acd720cc79e5cb52a8756a19e4cfc
                                                            • Instruction Fuzzy Hash: 26018135B101260FEBA4956DA45076BB3EFDBC9724F248439F50ECB788DEA9DC024395
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d066948bdd42aacf82b06480322d23458e15a33eaf42ebfdbf2ff1fd78cc323
                                                            • Instruction ID: 2f09a714ae79835be091f8af6febb7e2fd8455b5707a005ff05e3f8560883892
                                                            • Opcode Fuzzy Hash: 8d066948bdd42aacf82b06480322d23458e15a33eaf42ebfdbf2ff1fd78cc323
                                                            • Instruction Fuzzy Hash: 8D018C35B105220FDB64997DA49473F77DAEBC9610F208839F50ECB748EA25EC024395
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7b00939942c3c39ee1c0f4160f0eb86b4f2d53c542defd2fb7da7c2dc39254ff
                                                            • Instruction ID: 3335fee369a490e2c57e36bfbd05a07872226380b8ec8827022a980d0be251eb
                                                            • Opcode Fuzzy Hash: 7b00939942c3c39ee1c0f4160f0eb86b4f2d53c542defd2fb7da7c2dc39254ff
                                                            • Instruction Fuzzy Hash: 50013136B106254FDBA0967CD854B1F73DAFB89614F208439E50ACBB48EA25EC428791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 49aa7fd2afb359b86eff405195f77e0077e348a4fd27779ee40145c4b79ed56b
                                                            • Instruction ID: 2497a35aa97af255bee795cefa77d0411ce530dd77cc9f2b37e8ca3bfebbc59d
                                                            • Opcode Fuzzy Hash: 49aa7fd2afb359b86eff405195f77e0077e348a4fd27779ee40145c4b79ed56b
                                                            • Instruction Fuzzy Hash: E2F0A736E212789BDB549965DC00A9EB33AE784364F104429DD01E7748DB326C04C7D0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6178a38f0283393a63527aa9b096bf6a95dbb0a78a2317a44288b3cd68d661a
                                                            • Instruction ID: 63deb31c7d6953b7c49184d584846e8ac34d43db90eca40351d2481e63c051f6
                                                            • Opcode Fuzzy Hash: d6178a38f0283393a63527aa9b096bf6a95dbb0a78a2317a44288b3cd68d661a
                                                            • Instruction Fuzzy Hash: E8E06831900109EFCB10CE74CD44BAABBADEF06208F3048ACD048CBA03E532E9828790
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                                            • API String ID: 0-1298971921
                                                            • Opcode ID: 4a89c240810fb51a334442b2ece68af744580d7fdb3f00aebed87c00d340e96f
                                                            • Instruction ID: 3fbbfc07eae074b94fb15a674eba65e00a9b1749d50ab185721b8dc55999c563
                                                            • Opcode Fuzzy Hash: 4a89c240810fb51a334442b2ece68af744580d7fdb3f00aebed87c00d340e96f
                                                            • Instruction Fuzzy Hash: D0122D34E0072A8FDB64DFA5D854B9DB7B6BF88304F208569D40AAB758DB309D85CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                                            • API String ID: 0-3886557441
                                                            • Opcode ID: 1866c91f40c866f121f9bdde5b923c932bf5b0bd726c23fdb9a568abc0862dae
                                                            • Instruction ID: c40e4124c8d9e56c368986151e90dd3ad2f0cfcee8c3570a1a0495701946f550
                                                            • Opcode Fuzzy Hash: 1866c91f40c866f121f9bdde5b923c932bf5b0bd726c23fdb9a568abc0862dae
                                                            • Instruction Fuzzy Hash: 93916031E0021ADFEB64EF65E9547AEB7B6BF84310F248529E802DB658DB349C45CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q$$q$$q
                                                            • API String ID: 0-2069967915
                                                            • Opcode ID: c51055df3b410a19af4f66e06e27f4970f2742f5d4dc2791852e217ba32fef65
                                                            • Instruction ID: 631cd962e411e5dac12d536142930bbea5f6d4bcd62d04426439850e8424a31e
                                                            • Opcode Fuzzy Hash: c51055df3b410a19af4f66e06e27f4970f2742f5d4dc2791852e217ba32fef65
                                                            • Instruction Fuzzy Hash: A4F14E74B00219CFDB54EBA4D594B6EBBB7BF88305F248568D406AB758DF71AC42CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q
                                                            • API String ID: 0-4102054182
                                                            • Opcode ID: 20dd0f70d043d40c8edba11df9b41b65361860aa7908d8de87fb4f23797ab111
                                                            • Instruction ID: 60239692c6dbd974cf6f899f2424dcdc017c98e916e236a27c78f3d31568f881
                                                            • Opcode Fuzzy Hash: 20dd0f70d043d40c8edba11df9b41b65361860aa7908d8de87fb4f23797ab111
                                                            • Instruction Fuzzy Hash: 79B13D30A0021A8FDB64EB65DA947AEB7B6FF84304F248429D406DB758DF75DC86CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LRq$LRq$$q$$q
                                                            • API String ID: 0-2204215535
                                                            • Opcode ID: 97e98cfe1d46d4612eeb892a0f8d77bec28fa24a968c675b85fe37d0bd99999a
                                                            • Instruction ID: f0d5105784f49d45b952e1e11b09286be410c9ad0daceab678c5b6a8ad884918
                                                            • Opcode Fuzzy Hash: 97e98cfe1d46d4612eeb892a0f8d77bec28fa24a968c675b85fe37d0bd99999a
                                                            • Instruction Fuzzy Hash: 6F519434B002168FDB54EB24DA50B6A77FABF88304F148959E406DB759DF70EC45CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.3821181819.0000000006920000.00000040.00000800.00020000.00000000.sdmp, Offset: 06920000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_6920000_RegAsm.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q$$q$$q
                                                            • API String ID: 0-4102054182
                                                            • Opcode ID: b458413d8e91cf4f75d5d4ae7972778107090671314cbbf98b8e75f14f5feaca
                                                            • Instruction ID: bbf7aad4ef3b047dbecb58968bf906b6701faff0910e580cb1bfd776b716b61d
                                                            • Opcode Fuzzy Hash: b458413d8e91cf4f75d5d4ae7972778107090671314cbbf98b8e75f14f5feaca
                                                            • Instruction Fuzzy Hash: 1851D336E102168FDF64DB24E9906AEB3B6FF84311F24452AD802DB748DB34DC42CB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%