Loading ...

Play interactive tourEdit tour

Analysis Report CDC GUIDES COVID-19 Second Outbreak Warning release.scr

Overview

General Information

Sample Name:CDC GUIDES COVID-19 Second Outbreak Warning release.scr (renamed file extension from scr to exe)
Analysis ID:319216
MD5:dc8d9c9a86fe4830053697c1dc59dc6f
SHA1:a63fa3cc878efe75ecf849111c3e3d417fef4fdd
SHA256:5dcd1649d97e0da882778ec70677be52b49603b6596b044518f02c278d93d0f2

Most interesting Screenshot:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
.NET source code references suspicious native API functions
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains strange resources
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • vlc.exe (PID: 6588 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe' MD5: DC8D9C9A86FE4830053697C1DC59DC6F)
    • vlc.exe (PID: 2172 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe MD5: DC8D9C9A86FE4830053697C1DC59DC6F)
  • vlc.exe (PID: 6824 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe' MD5: DC8D9C9A86FE4830053697C1DC59DC6F)
    • vlc.exe (PID: 4080 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe MD5: DC8D9C9A86FE4830053697C1DC59DC6F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
  • 0xe70d7:$s1: DoUploadAndExecute
  • 0x13def7:$s1: DoUploadAndExecute
  • 0xe731b:$s2: DoDownloadAndExecute
  • 0x13e13b:$s2: DoDownloadAndExecute
  • 0xe6e9c:$s3: DoShellExecute
  • 0x13dcbc:$s3: DoShellExecute
  • 0xe72d3:$s4: set_Processname
  • 0x13e0f3:$s4: set_Processname
  • 0xae9d4:$op1: 04 1E FE 02 04 16 FE 01 60
  • 0x1057f4:$op1: 04 1E FE 02 04 16 FE 01 60
  • 0xae8f8:$op2: 00 17 03 1F 20 17 19 15 28
  • 0x105718:$op2: 00 17 03 1F 20 17 19 15 28
  • 0xaf35e:$op3: 00 04 03 69 91 1B 40
  • 0xafbae:$op3: 00 04 03 69 91 1B 40
  • 0x10617e:$op3: 00 04 03 69 91 1B 40
  • 0x1069ce:$op3: 00 04 03 69 91 1B 40
0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
    • 0x3df27:$s1: DoUploadAndExecute
    • 0x3e16b:$s2: DoDownloadAndExecute
    • 0x3dcec:$s3: DoShellExecute
    • 0x3e123:$s4: set_Processname
    • 0x5824:$op1: 04 1E FE 02 04 16 FE 01 60
    • 0x5748:$op2: 00 17 03 1F 20 17 19 15 28
    • 0x61ae:$op3: 00 04 03 69 91 1B 40
    • 0x69fe:$op3: 00 04 03 69 91 1B 40
    00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x3df27:$s1: DoUploadAndExecute
      • 0x3e16b:$s2: DoDownloadAndExecute
      • 0x3dcec:$s3: DoShellExecute
      • 0x3e123:$s4: set_Processname
      • 0x5824:$op1: 04 1E FE 02 04 16 FE 01 60
      • 0x5748:$op2: 00 17 03 1F 20 17 19 15 28
      • 0x61ae:$op3: 00 04 03 69 91 1B 40
      • 0x69fe:$op3: 00 04 03 69 91 1B 40
      Click to see the 13 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      21.2.vlc.exe.400000.0.unpackVermin_Keylogger_Jan18_1Detects Vermin KeyloggerFlorian Roth
      • 0x3ec0a:$x3: GetKeyloggerLogsResponse
      • 0x3de62:$x4: GetKeyloggerLogs
      • 0x3e13a:$s1: <RunHidden>k__BackingField
      • 0x3edd2:$s2: set_SystemInfos
      • 0x3e163:$s3: set_RunHidden
      • 0x3dc96:$s4: set_RemotePath
      • 0x56628:$s6: Client.exe
      • 0x566bc:$s6: Client.exe
      • 0x32029:$s7: xClient.Core.ReverseProxy.Packets
      21.2.vlc.exe.400000.0.unpackxRAT_1Detects Patchwork malwareFlorian Roth
      • 0x305c0:$x4: xClient.Properties.Resources.resources
      • 0x30481:$s4: Client.exe
      • 0x3e163:$s7: set_RunHidden
      21.2.vlc.exe.400000.0.unpackQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x3e127:$s1: DoUploadAndExecute
      • 0x3e36b:$s2: DoDownloadAndExecute
      • 0x3deec:$s3: DoShellExecute
      • 0x3e323:$s4: set_Processname
      • 0x5a24:$op1: 04 1E FE 02 04 16 FE 01 60
      • 0x5948:$op2: 00 17 03 1F 20 17 19 15 28
      • 0x63ae:$op3: 00 04 03 69 91 1B 40
      • 0x6bfe:$op3: 00 04 03 69 91 1B 40
      21.2.vlc.exe.400000.0.unpackQuasar_RAT_2Detects Quasar RATFlorian Roth
      • 0x3ec0a:$x1: GetKeyloggerLogsResponse
      • 0x3ee4a:$s1: DoShellExecuteResponse
      • 0x3e7b9:$s2: GetPasswordsResponse
      • 0x3ed1d:$s3: GetStartupItemsResponse
      • 0x3e13b:$s5: RunHidden
      • 0x3e159:$s5: RunHidden
      • 0x3e167:$s5: RunHidden
      • 0x3e17b:$s5: RunHidden
      21.2.vlc.exe.400000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x4f649:$xc1: 41 00 64 00 6D 00 69 00 6E 00 00 11 73 00 63 00 68 00 74 00 61 00 73 00 6B 00 73 00 00 1B 2F 00 ...
      • 0x4f87f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C ...
      Click to see the 16 entries

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeReversingLabs: Detection: 12%
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeReversingLabs: Detection: 12%
      Multi AV Scanner detection for submitted fileShow sources
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeReversingLabs: Detection: 12%
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeReversingLabs: Detection: 12%
      Yara detected Quasar RATShow sources
      Source: Yara matchFile source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 2172, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 2764, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 4080, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6588, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 5820, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6824, type: MEMORY
      Source: Yara matchFile source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior

      Networking:

      barindex
      May check the online IP address of the machineShow sources
      Source: unknownDNS query: name: ip-api.com
      Source: unknownDNS query: name: ip-api.com
      Source: global trafficTCP traffic: 192.168.2.3:49736 -> 185.244.26.221:4782
      Source: global trafficTCP traffic: 192.168.2.3:49736 -> 185.244.26.221:4782
      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
      Source: unknownDNS traffic detected: queries for: ip-api.com
      Source: unknownDNS traffic detected: queries for: ip-api.com
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://api.ipify.org/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839709535.00000000031D9000.00000004.00000001.sdmpString found in binary or memory: http://crl.m0odoca
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://freegeoip.net/xml/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpString found in binary or memory: http://ip-api.com
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://ip-api.com/json/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpString found in binary or memory: http://ip-api.com4
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: http://ocsp.comodoca.com0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ocsp.thawte.com0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://s.symcd.com06
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837474746.0000000002F23000.00000004.00000001.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://d.symcb.com/cps0%
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://d.symcb.com/rpa0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://d.symcb.com/rpa0.
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://www.globalsign.com/repository/0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://api.ipify.org/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839709535.00000000031D9000.00000004.00000001.sdmpString found in binary or memory: http://crl.m0odoca
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://freegeoip.net/xml/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpString found in binary or memory: http://ip-api.com
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://ip-api.com/json/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpString found in binary or memory: http://ip-api.com4
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: http://ocsp.comodoca.com0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ocsp.thawte.com0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://s.symcd.com06
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837474746.0000000002F23000.00000004.00000001.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://d.symcb.com/cps0%
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://d.symcb.com/rpa0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://d.symcb.com/rpa0.
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeString found in binary or memory: https://www.globalsign.com/repository/0
      Source: vlc.exe, 0000000E.00000002.352476510.0000000000ACB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: vlc.exe, 0000000E.00000002.352476510.0000000000ACB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud:

      barindex
      Yara detected Quasar RATShow sources
      Source: Yara matchFile source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 2172, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 2764, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 4080, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6588, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 5820, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6824, type: MEMORY
      Source: Yara matchFile source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_02D5FA700_2_02D5FA70
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D91FA80_2_05D91FA8
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D946600_2_05D94660
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D909100_2_05D90910
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D900400_2_05D90040
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D990F00_2_05D990F0
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D990E00_2_05D990E0
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D9A2120_2_05D9A212
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_02D5FA700_2_02D5FA70
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D91FA80_2_05D91FA8
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D946600_2_05D94660
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D909100_2_05D90910
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D900400_2_05D90040
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D990F00_2_05D990F0
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D990E00_2_05D990E0
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D9A2120_2_05D9A212
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_0142F0905_2_0142F090
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_0142F9605_2_0142F960
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_0142ED485_2_0142ED48
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_066CE6DB5_2_066CE6DB
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_066C8EB85_2_066C8EB8
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_066C4A605_2_066C4A60
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_066C58645_2_066C5864
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_067342B85_2_067342B8
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_00D0FA7014_2_00D0FA70
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E21FA814_2_04E21FA8
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E2489014_2_04E24890
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E2487F14_2_04E2487F
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E2004014_2_04E20040
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E2091014_2_04E20910
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E28AE114_2_04E28AE1
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E28AF014_2_04E28AF0
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_04E24B0814_2_04E24B08
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 15_2_050E1FA815_2_050E1FA8
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 15_2_050E091015_2_050E0910
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 15_2_050E004015_2_050E0040
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 15_2_050E487F15_2_050E487F
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 15_2_050E489015_2_050E4890
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 15_2_050E8AE115_2_050E8AE1
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 15_2_050E8AF015_2_050E8AF0
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 20_2_032EF09020_2_032EF090
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 20_2_032EF96020_2_032EF960
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 20_2_032EED4820_2_032EED48
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 21_2_02E2F09021_2_02E2F090
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 21_2_02E2F96021_2_02E2F960
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 21_2_02E2ED4821_2_02E2ED48
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 21_2_055F519821_2_055F5198
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 21_2_055F51A821_2_055F51A8
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 21_2_055F10B821_2_055F10B8
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: invalid certificate
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: invalid certificate
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vlc.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vlc.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 9FFWrx9i8Kuq.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 9FFWrx9i8Kuq.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vlc.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vlc.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 9FFWrx9i8Kuq.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 9FFWrx9i8Kuq.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000000.200975576.0000000000BCA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameZzjjddspu2.exe0 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.272315963.0000000005390000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.272529925.0000000005520000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePtgjunquq.dll4 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClassLibrary3.dll< vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClient.exe" vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.833556159.0000000000B8A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameZzjjddspu2.exe0 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDyxylehx1.exe8 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.833725048.0000000000F38000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.832620216.000000000045A000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameClient.exe" vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeBinary or memory string: OriginalFilenameZzjjddspu2.exe0 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000000.200975576.0000000000BCA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameZzjjddspu2.exe0 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.272315963.0000000005390000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.272529925.0000000005520000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePtgjunquq.dll4 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClassLibrary3.dll< vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClient.exe" vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.833556159.0000000000B8A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameZzjjddspu2.exe0 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDyxylehx1.exe8 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.833725048.0000000000F38000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.832620216.000000000045A000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameClient.exe" vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeBinary or memory string: OriginalFilenameZzjjddspu2.exe0 vs CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
      Source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: vlc.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: vlc.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: vlc.exe.0.dr, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.0.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b40000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b40000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 5.0.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b00000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b00000.1.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 14.2.vlc.exe.340000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 14.0.vlc.exe.340000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 15.2.vlc.exe.600000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 15.0.vlc.exe.600000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 20.2.vlc.exe.df0000.1.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: vlc.exe.0.dr, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.0.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b40000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 0.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b40000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 5.0.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b00000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.b00000.1.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 14.2.vlc.exe.340000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 14.0.vlc.exe.340000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 15.2.vlc.exe.600000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 15.0.vlc.exe.600000.0.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 20.2.vlc.exe.df0000.1.unpack, u0006/u0008.csCryptographic APIs: 'TransformFinalBlock'
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, ufffd?u23de?u2b96???ue028??ufd45???ufffd??ue0ca?.csBase64 encoded string: 'PWj6lHXDOxrLfwXNzfnaLMjOfzO9+W+4JxWWiTvfenV8SQApGzJ0Di/b8fuXcZ0M5PrXoL7V9sk8b6uX8xhtZw==', 'm0LUgy1TBJLS/Rv0+i1hOxLPRvKMsf09np12UQ5OrwBPWWSUYbRf+y9WQJ8KY1h7++uGSo0tWuw0x8ypgzipLl1b12b1d2xLp6CNHiFEtAk=', 'NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==', 'T5995aiahDmRotzNR+wPzkhM3KlC5s/O43KC/1X3Cxu2swVztTyi14Z01j5qsLhy+ZSCP+lJl3YSu4KaMkTl74E6v3MGTgcDoCAikm98Vzg=', 'jLorJj8inqFdgz/bM7KXpwKX+vdTgIpVKMMjF72veNdt62nzBlqRLeihc0RWxDu4tSOd4DuvQwCqGcdB8QTCyQ=='
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, ufffd?u23de?u2b96???ue028??ufd45???ufffd??ue0ca?.csBase64 encoded string: 'PWj6lHXDOxrLfwXNzfnaLMjOfzO9+W+4JxWWiTvfenV8SQApGzJ0Di/b8fuXcZ0M5PrXoL7V9sk8b6uX8xhtZw==', 'm0LUgy1TBJLS/Rv0+i1hOxLPRvKMsf09np12UQ5OrwBPWWSUYbRf+y9WQJ8KY1h7++uGSo0tWuw0x8ypgzipLl1b12b1d2xLp6CNHiFEtAk=', 'NcFtjbDOcsw7Evd3coMC0y4koy/SRZGydhNmno81ZOWOvdfg7sv0Cj5ad2ROUfX4QMscAIjYJdjrrs41+qcQwg==', 'T5995aiahDmRotzNR+wPzkhM3KlC5s/O43KC/1X3Cxu2swVztTyi14Z01j5qsLhy+ZSCP+lJl3YSu4KaMkTl74E6v3MGTgcDoCAikm98Vzg=', 'jLorJj8inqFdgz/bM7KXpwKX+vdTgIpVKMMjF72veNdt62nzBlqRLeihc0RWxDu4tSOd4DuvQwCqGcdB8QTCyQ=='
      Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@2/2
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLANJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLANJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeMutant created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_aEyHRwA2EwWBI7cCGO
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeMutant created: \Sessions\1\BaseNamedObjects\QSR_MUTEX_aEyHRwA2EwWBI7cCGO
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to behavior
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeReversingLabs: Detection: 12%
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeReversingLabs: Detection: 12%
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile read: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe 'C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe'
      Source: unknownProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe 'C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe'
      Source: unknownProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_02D5B712 pushfd ; iretd 0_2_02D5B771
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_02D5F438 pushfd ; iretd 0_2_02D5F43D
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_02D5B712 pushfd ; iretd 0_2_02D5B771
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_02D5F438 pushfd ; iretd 0_2_02D5F43D
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_066CD100 push es; ret 5_2_066CD104
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 5_2_066CDF3F push es; ret 5_2_066CDF40
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 14_2_00D0B718 pushfd ; iretd 14_2_00D0B771
      Source: initial sampleStatic PE information: section name: .text entropy: 7.95282361002
      Source: initial sampleStatic PE information: section name: .text entropy: 7.95282361002
      Source: initial sampleStatic PE information: section name: .text entropy: 7.95282361002
      Source: initial sampleStatic PE information: section name: .text entropy: 7.95282361002
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: \cdc guides covid-19 second outbreak warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: \cdc guides covid-19 second outbreak warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: \cdc guides covid-19 second outbreak warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: \cdc guides covid-19 second outbreak warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to dropped file
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to dropped file
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to dropped file
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to dropped file
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLANJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe\:Zone.Identifier:$DATAJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLANJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe\:Zone.Identifier:$DATAJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vlcJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vlcJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vlcJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vlcJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile opened: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile opened: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile opened: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeFile opened: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.272529925.0000000005520000.00000004.00000001.sdmp, vlc.exe, 0000000E.00000002.354177047.00000000036E1000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.837912973.0000000004387000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLHEAD
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.272529925.0000000005520000.00000004.00000001.sdmp, vlc.exe, 0000000E.00000002.354177047.00000000036E1000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.837912973.0000000004387000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLHEAD
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWindow / User API: threadDelayed 676Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWindow / User API: threadDelayed 1715Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWindow / User API: threadDelayed 676Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWindow / User API: threadDelayed 1715Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 4664Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 6232Thread sleep count: 676 > 30Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 6232Thread sleep count: 1715 > 30Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 5884Thread sleep count: 44 > 30Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 5884Thread sleep time: -110000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 6668Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 6868Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 4912Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 1380Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 4664Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 6232Thread sleep count: 676 > 30Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 6232Thread sleep count: 1715 > 30Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 5884Thread sleep count: 44 > 30Jump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe TID: 5884Thread sleep time: -110000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 6668Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 6868Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 4912Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 1380Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.837912973.0000000004387000.00000004.00000001.sdmpBinary or memory string: vmware+microsoft corporation
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: 9FFWrx9i8Kuq.exe, 00000026.00000002.837912973.0000000004387000.00000004.00000001.sdmpBinary or memory string: vmware+microsoft corporation
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.842823257.00000000061E0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      .NET source code references suspicious native API functionsShow sources
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, ??u08bd????ue13eu26f9?ue3e2???uedca?uef61???.csReference to suspicious API methods: ('????????????????????', 'LoadLibrary@kernel32.dll'), ('????????????????????', 'GetProcAddress@kernel32.dll')
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, ??uf6f5???ue4b2?????????????.csReference to suspicious API methods: ('????????????????????', 'MapVirtualKeyEx@user32.dll')
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, ??u08bd????ue13eu26f9?ue3e2???uedca?uef61???.csReference to suspicious API methods: ('????????????????????', 'LoadLibrary@kernel32.dll'), ('????????????????????', 'GetProcAddress@kernel32.dll')
      Source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, ??uf6f5???ue4b2?????????????.csReference to suspicious API methods: ('????????????????????', 'MapVirtualKeyEx@user32.dll')
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeMemory written: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeMemory written: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeProcess created: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.836473892.00000000018D0000.00000002.00000001.sdmp, 9FFWrx9i8Kuq.exe, 00000026.00000002.834891803.0000000001D20000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D9EC10 GetUserNameA,0_2_05D9EC10
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeCode function: 0_2_05D9EC10 GetUserNameA,0_2_05D9EC10
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information:

      barindex
      Yara detected Quasar RATShow sources
      Source: Yara matchFile source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 2172, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 2764, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 4080, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6588, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 5820, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6824, type: MEMORY
      Source: Yara matchFile source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Yara detected Quasar RATShow sources
      Source: Yara matchFile source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 2172, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 2764, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 4080, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6588, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: CDC GUIDES COVID-19 Second Outbreak Warning release.exe PID: 5820, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: vlc.exe PID: 6824, type: MEMORY
      Source: Yara matchFile source: 21.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 20.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation121Registry Run Keys / Startup Folder11Process Injection112Disable or Modify Tools1Input Capture1Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsNative API1Boot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder11Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information21Security Account ManagerSystem Information Discovery123SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing2NTDSSecurity Software Discovery221Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsVirtualization/Sandbox Evasion4SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol12Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion4Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingSystem Network Configuration Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 319216 Sample: CDC GUIDES COVID-19 Second ... Startdate: 18/11/2020 Architecture: WINDOWS Score: 100 41 Malicious sample detected (through community Yara rule) 2->41 43 Multi AV Scanner detection for dropped file 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 5 other signatures 2->47 7 CDC GUIDES COVID-19 Second Outbreak Warning release.exe 1 4 2->7         started        11 vlc.exe 2->11         started        13 vlc.exe 1 2->13         started        process3 file4 29 C:\Users\user\AppData\Roaming\...\vlc.exe, PE32 7->29 dropped 31 C:\Users\user\...\vlc.exe:Zone.Identifier, ASCII 7->31 dropped 33 CDC GUIDES COVID-1...ing release.exe.log, ASCII 7->33 dropped 49 Injects a PE file into a foreign processes 7->49 15 CDC GUIDES COVID-19 Second Outbreak Warning release.exe 15 3 7->15         started        20 vlc.exe 2 11->20         started        22 vlc.exe 2 13->22         started        signatures5 process6 dnsIp7 35 devils.shacknet.us 185.244.26.221, 4782, 49736 VAMU-ASIP-TRANSITVAMURU Netherlands 15->35 37 ip-api.com 208.95.112.1, 49735, 80 TUT-ASUS United States 15->37 27 C:\Users\user\AppData\...\9FFWrx9i8Kuq.exe, PE32 15->27 dropped 39 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->39 24 9FFWrx9i8Kuq.exe 2 15->24         started        file8 signatures9 process10 signatures11 51 Machine Learning detection for dropped file 24->51

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      CDC GUIDES COVID-19 Second Outbreak Warning release.exe12%ReversingLabs

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe12%ReversingLabs

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      21.2.vlc.exe.400000.0.unpack100%AviraHEUR/AGEN.1135947Download File
      5.2.CDC GUIDES COVID-19 Second Outbreak Warning release.exe.400000.0.unpack100%AviraHEUR/AGEN.1135947Download File
      20.2.vlc.exe.400000.0.unpack100%AviraHEUR/AGEN.1135947Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://crl.m0odoca0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
      http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
      http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
      http://ocsp.thawte.com00%URL Reputationsafe
      http://ocsp.thawte.com00%URL Reputationsafe
      http://ocsp.thawte.com00%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      https://www.chiark.greenend.org.uk/~sgtatham/putty/00%Avira URL Cloudsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://ip-api.com40%Avira URL Cloudsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      ip-api.com
      208.95.112.1
      truefalse
        high
        devils.shacknet.us
        185.244.26.221
        truefalse
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://ip-api.com/json/false
            high

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.09FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.com9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersG9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                  high
                  http://freegeoip.net/xml/CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                      high
                      http://crl.m0odocaCDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839709535.00000000031D9000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cn/bThe9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://schemas.datacontract.org/2004/07/CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837474746.0000000002F23000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                        high
                        http://ocsp.thawte.com0CDC GUIDES COVID-19 Second Outbreak Warning release.exefalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.com9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                          high
                          http://www.goodfont.co.kr9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://www.chiark.greenend.org.uk/~sgtatham/putty/0CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.839822026.0000000003207000.00000004.00000001.sdmp, 9FFWrx9i8Kuq.exe.5.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.coml9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://ip-api.com4CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sajatypeworks.com9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netD9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlN9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cThe9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htm9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.com9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.html9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                              high
                              http://crl.thawte.com/ThawteTimestampingCA.crl0CDC GUIDES COVID-19 Second Outbreak Warning release.exefalse
                                high
                                http://www.jiyu-kobo.co.jp/9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://ip-api.comCDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.galapagosdesign.com/DPlease9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://api.ipify.org/CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000000.00000002.267762525.0000000002F82000.00000004.00000001.sdmp, CDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, vlc.exe, 0000000E.00000002.353478457.0000000002A3F000.00000004.00000001.sdmp, vlc.exe, 0000000F.00000002.372076333.0000000002E5F000.00000004.00000001.sdmp, vlc.exe, 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, vlc.exe, 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers89FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.fonts.com9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.sandoll.co.kr9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPlease9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cn9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCDC GUIDES COVID-19 Second Outbreak Warning release.exe, 00000005.00000002.837102867.0000000002EDC000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.sakkal.com9FFWrx9i8Kuq.exe, 00000026.00000002.842466971.00000000063A0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          208.95.112.1
                                          unknownUnited States
                                          53334TUT-ASUSfalse
                                          185.244.26.221
                                          unknownNetherlands
                                          47158VAMU-ASIP-TRANSITVAMURUfalse

                                          General Information

                                          Joe Sandbox Version:31.0.0 Red Diamond
                                          Analysis ID:319216
                                          Start date:18.11.2020
                                          Start time:05:46:57
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 15m 2s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:CDC GUIDES COVID-19 Second Outbreak Warning release.scr (renamed file extension from scr to exe)
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:39
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@11/5@2/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:
                                          • Successful, ratio: 0.7% (good quality ratio 0.4%)
                                          • Quality average: 47.1%
                                          • Quality standard deviation: 39.7%
                                          HCA Information:
                                          • Successful, ratio: 96%
                                          • Number of executed functions: 87
                                          • Number of non-executed functions: 6
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, RuntimeBroker.exe, backgroundTaskHost.exe, UsoClient.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, MusNotifyIcon.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Excluded IPs from analysis (whitelisted): 104.42.151.234, 104.43.139.144, 51.104.139.180, 2.20.84.85, 20.54.26.129, 2.20.142.210, 2.20.142.209, 92.122.213.194, 92.122.213.247, 52.155.217.156, 40.90.23.247, 40.90.137.127, 40.90.137.124, 40.90.23.154, 40.90.23.208, 13.104.215.69, 40.90.137.120, 40.90.137.126, 51.11.168.232
                                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, login.live.com, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, login.msa.msidentity.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, umwatsonrouting.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/319216/sample/CDC GUIDES COVID-19 Second Outbreak Warning release.exe

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          05:48:17AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run vlc "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"
                                          05:48:25AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run vlc "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"

                                          Joe Sandbox View / Context

                                          IPs

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          208.95.112.1JfBrVoAbZJ.exeGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          COMSurrogate.exeGet hashmaliciousBrowse
                                          • ip-api.com/xml
                                          XbVizOmLp2.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          5GdTme5iYr.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          ASX9zO2dRS.exeGet hashmaliciousBrowse
                                          • ip-api.com/json
                                          nW6wmlBvYs.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          58M6JBEHW4.exeGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          wQDprpZ6i7.exeGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          Xxgm9UF1xP.exeGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          mY08H9Efjn.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          DHL Shipment Notice of Arrival AWB 8032697940773.jsGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          UuKzWnNMP6.exeGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          xGaL85Q9T2.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          J7y5VaY5WM.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          M5tzeNIe5t.exeGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          1LdcfAJXhM.exeGet hashmaliciousBrowse
                                          • ip-api.com/json/
                                          hjeBW2gHjq.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          FOZUynGAgb.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/?fields
                                          s2VoGiX9ai.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/
                                          Bo0YWPrh0j.exeGet hashmaliciousBrowse
                                          • ip-api.com/line/

                                          Domains

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          ip-api.comJfBrVoAbZJ.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          COMSurrogate.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          XbVizOmLp2.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          5GdTme5iYr.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          ASX9zO2dRS.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          nW6wmlBvYs.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          58M6JBEHW4.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          wQDprpZ6i7.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          Xxgm9UF1xP.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          mY08H9Efjn.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          DHL Shipment Notice of Arrival AWB 8032697940773.jsGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          UuKzWnNMP6.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          xGaL85Q9T2.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          J7y5VaY5WM.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          M5tzeNIe5t.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          1LdcfAJXhM.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          hjeBW2gHjq.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          FOZUynGAgb.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          s2VoGiX9ai.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          Bo0YWPrh0j.exeGet hashmaliciousBrowse
                                          • 208.95.112.1

                                          ASN

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          VAMU-ASIP-TRANSITVAMURU85RNPseqgJ.exeGet hashmaliciousBrowse
                                          • 185.244.26.206
                                          Olzcqxcxnf9.exeGet hashmaliciousBrowse
                                          • 185.244.26.213
                                          R1MfM3z2Nz.exeGet hashmaliciousBrowse
                                          • 185.244.26.206
                                          Fh06tuCZaK.exeGet hashmaliciousBrowse
                                          • 185.244.26.206
                                          AlTKG0L5d8.exeGet hashmaliciousBrowse
                                          • 185.244.26.206
                                          Rbmmuoavjkz8.exeGet hashmaliciousBrowse
                                          • 185.244.26.213
                                          PO 6300019918..exeGet hashmaliciousBrowse
                                          • 185.244.26.206
                                          gSTnUDrWFe.exeGet hashmaliciousBrowse
                                          • 185.244.26.199
                                          FpK385nmHk.exeGet hashmaliciousBrowse
                                          • 185.244.26.199
                                          7sbXVpHq6E.exeGet hashmaliciousBrowse
                                          • 185.244.26.199
                                          Order N#U00b022019.exeGet hashmaliciousBrowse
                                          • 185.244.26.219
                                          scan.exeGet hashmaliciousBrowse
                                          • 185.244.26.219
                                          3kpUlycHABfLMj6.exeGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          BTQBVILB.EXEGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          NCNRDEZ1.EXEGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          BM6GMIYN.EXEGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          QPI51NCL.EXEGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          LqyD3LqYjmUTl0n.exeGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          B6X9zW00qtAZXYd.exeGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          uPtScCCsvXI2Nj0.exeGet hashmaliciousBrowse
                                          • 185.244.26.228
                                          TUT-ASUSJfBrVoAbZJ.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          COMSurrogate.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          XbVizOmLp2.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          5GdTme5iYr.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          nW6wmlBvYs.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          58M6JBEHW4.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          wQDprpZ6i7.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          Xxgm9UF1xP.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          mY08H9Efjn.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          DHL Shipment Notice of Arrival AWB 8032697940773.jsGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          UuKzWnNMP6.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          xGaL85Q9T2.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          J7y5VaY5WM.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          M5tzeNIe5t.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          1LdcfAJXhM.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          hjeBW2gHjq.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          FOZUynGAgb.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          s2VoGiX9ai.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          Bo0YWPrh0j.exeGet hashmaliciousBrowse
                                          • 208.95.112.1
                                          UJr2wEBvsX.exeGet hashmaliciousBrowse
                                          • 208.95.112.1

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CDC GUIDES COVID-19 Second Outbreak Warning release.exe.log
                                          Process:C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):517
                                          Entropy (8bit):5.335306720429945
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhaxzAbDLI4M6:ML9E4Ks2wKDE4KhK3VZ9pKhmsXE4j
                                          MD5:BB6624785B5CCCA1B27C160A2F19C179
                                          SHA1:51C3A976DB55F4E09009C1E7663643A2205FBEA5
                                          SHA-256:CF05D58CFF71D857664AAB4D49D3ABABFD0D59A65303B0FA5B1996C1CD3E66DA
                                          SHA-512:83C5B206F17844ECE6D3F8330C661A66C76803DF80BDD29780C541963D4693F89947407336D4CDE03F1F902C8F50B64E4F49C1577B99AAB09EDA16F1677CA843
                                          Malicious:true
                                          Reputation:moderate, very likely benign file
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vlc.exe.log
                                          Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):517
                                          Entropy (8bit):5.335306720429945
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhaxzAbDLI4M6:ML9E4Ks2wKDE4KhK3VZ9pKhmsXE4j
                                          MD5:BB6624785B5CCCA1B27C160A2F19C179
                                          SHA1:51C3A976DB55F4E09009C1E7663643A2205FBEA5
                                          SHA-256:CF05D58CFF71D857664AAB4D49D3ABABFD0D59A65303B0FA5B1996C1CD3E66DA
                                          SHA-512:83C5B206F17844ECE6D3F8330C661A66C76803DF80BDD29780C541963D4693F89947407336D4CDE03F1F902C8F50B64E4F49C1577B99AAB09EDA16F1677CA843
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                          C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe
                                          Process:C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):287120
                                          Entropy (8bit):4.744226336831956
                                          Encrypted:false
                                          SSDEEP:6144:ZL9q3/hFX11OUPKLIIjjGzIAh9+B2UTeZis7OiQGYH649Mwxz:J0/X11OUPK5jjSAB2UTKpOiQGYH3Mwxz
                                          MD5:082B27BB1AAA169A5D0C4CD536976F99
                                          SHA1:F0C3E75BDC2D2F57B1309F3A26FB99E67546012C
                                          SHA-256:A8886AF066529DB9AE1A07AE170DC1B80726952DE1094ED5E14520922DC47A54
                                          SHA-512:BD2175E9EDF2B314901904E4F0EB81C7969B2ADAD2F9033BC95B0F28ACDB2D2C15B9B2EE5A2D36D31D20A4066BF768012344001D1EF1FFE4641674C3C35F2239
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          Reputation:low
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y.._............................"'... ...@....@.. ....................................@..................................&..W....@...............$...=...`....................................................... ............... ..H............text...(.... ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................'......H............$......;...h4...............................................0.............-.&(....+.&+.*....0..h....... .....-.&~.....,.&+).+..+....(....r...p(.....-.&. ....Z.+..+.. .&..1..(.... .H... _......Z...Y.. ....0.*.0.............-.&(....+.&+.*....0..........r...p.-.&+.(....+.*..0...........%.-.&9....+..+..r...p(....-B.r/..p(....-H.rA..p(....-N.rY..p(....-L.ri..p(....-J.r...p(....-H*r...p.-.&+.(....+.*r...p.-.&+.(....+.*r...p(....*r...p(....*r...p(....*r...p(....*....0..
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          Process:C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):645440
                                          Entropy (8bit):7.920263997977594
                                          Encrypted:false
                                          SSDEEP:12288:/4WN/IQY26pufbscH9POzQpGf2JUC5KJq7n8eUUI+PBUJXAXq:/Bb6ZcdOH2+CMJ2aiBUJXAXq
                                          MD5:DC8D9C9A86FE4830053697C1DC59DC6F
                                          SHA1:A63FA3CC878EFE75ECF849111C3E3D417FEF4FDD
                                          SHA-256:5DCD1649D97E0DA882778EC70677BE52B49603B6596B044518F02C278D93D0F2
                                          SHA-512:8F91ACA4B85D53745F395888FFB8E2D5F17F06AFC7E302F2ED19C840377C70EF807BA14748FEFD2A756B27B54808651087FBCBA572F0D162B06C8A0E9283EF8C
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 12%
                                          Reputation:low
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.................b...D........... ........@.. ....................... ............@....................................J........@..............@1........................................................... ............... ..H............text....a... ...b.................. ..`.rsrc....@.......B...d..............@..@.reloc..............................@..B........................H............>..........h...e...........................................N+.+.*(....+.(....+..0.......... ..a.%,[8....8....&8.... ....a%..^8....8.....Y.-..:v...E........ .......5...P....,.+.8{... .{V.%,7Z ...&a.-.+m+.+l I.46Z ..p.a+a8.......(..... }.m.Z ..z.a.8m.... Z.}.Z (>.Ea.8Z....8T...(q...8O....8O....8X....8W....8.....+..+..+...(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(....*..(.
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe:Zone.Identifier
                                          Process:C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview: [ZoneTransfer]....ZoneId=0

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.920263997977594
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                          • Win32 Executable (generic) a (10002005/4) 49.97%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          File size:645440
                                          MD5:dc8d9c9a86fe4830053697c1dc59dc6f
                                          SHA1:a63fa3cc878efe75ecf849111c3e3d417fef4fdd
                                          SHA256:5dcd1649d97e0da882778ec70677be52b49603b6596b044518f02c278d93d0f2
                                          SHA512:8f91aca4b85d53745f395888ffb8e2d5f17f06afc7e302f2ed19c840377c70ef807ba14748fefd2a756b27b54808651087fbcba572f0d162b06c8a0e9283ef8c
                                          SSDEEP:12288:/4WN/IQY26pufbscH9POzQpGf2JUC5KJq7n8eUUI+PBUJXAXq:/Bb6ZcdOH2+CMJ2aiBUJXAXq
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.................b...D........... ........@.. ....................... ............@................................

                                          File Icon

                                          Icon Hash:3b3b332b696932b2

                                          Static PE Info

                                          General

                                          Entrypoint:0x488117
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                          Time Stamp:0x5FB3FDCD [Tue Nov 17 16:43:57 2020 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:v4.0.30319
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                          Authenticode Signature

                                          Signature Valid:false
                                          Signature Issuer:CN=GlobalSign CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE
                                          Signature Validation Error:The digital signature of the object did not verify
                                          Error Number:-2146869232
                                          Not Before, Not After
                                          • 8/25/2020 6:42:07 AM 8/26/2023 6:42:07 AM
                                          Subject Chain
                                          • CN=win.rar GmbH, O=win.rar GmbH, L=Berlin, S=Berlin, C=DE
                                          Version:3
                                          Thumbprint MD5:185DBD4A2E2671589EEB3E7E1920EA9F
                                          Thumbprint SHA-1:B3DF816A17A25557316D181DDB9F46254D6D8CA0
                                          Thumbprint SHA-256:66DB1C86D38273627C837F4638122FA88BBFFFF31C4052115B98CAF6CE0C631E
                                          Serial:731D40AE3F3A1FB2BC3D8395

                                          Entrypoint Preview

                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x880cd0x4a.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x14003.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x9a8000x3140.rsrc
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x8611d0x86200False0.959510426375data7.95282361002IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .rsrc0x8a0000x140030x14200False0.831982725155data7.61557514964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xa00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0x8a09c0x568GLS_BINARY_LSB_FIRST
                                          RT_ICON0x8a6280x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
                                          RT_ICON0x8aef40xea8data
                                          RT_ICON0x8bdc00x468GLS_BINARY_LSB_FIRST
                                          RT_ICON0x8c24c0x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                          RT_ICON0x8d3180x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                          RT_ICON0x8f8e40xd646PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                          RT_GROUP_ICON0x9cf660x68data
                                          RT_VERSION0x9d00a0x368data
                                          RT_MANIFEST0x9d3ae0xc55XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                          Imports

                                          DLLImport
                                          mscoree.dll_CorExeMain

                                          Network Behavior

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 18, 2020 05:48:18.525491953 CET4973580192.168.2.3208.95.112.1
                                          Nov 18, 2020 05:48:18.556354046 CET8049735208.95.112.1192.168.2.3
                                          Nov 18, 2020 05:48:18.556437969 CET4973580192.168.2.3208.95.112.1
                                          Nov 18, 2020 05:48:18.556812048 CET4973580192.168.2.3208.95.112.1
                                          Nov 18, 2020 05:48:18.587726116 CET8049735208.95.112.1192.168.2.3
                                          Nov 18, 2020 05:48:18.638310909 CET4973580192.168.2.3208.95.112.1
                                          Nov 18, 2020 05:48:19.751044989 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:48:19.984572887 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:48:19.984734058 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:48:20.218857050 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:48:20.263480902 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:48:20.783591032 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:48:21.018487930 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:48:21.060591936 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:48:46.031399965 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:48:46.265988111 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:48:46.294056892 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:48:46.294157982 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:49:11.283453941 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:49:11.516608000 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:49:11.533206940 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:49:11.533683062 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:49:32.079123974 CET8049735208.95.112.1192.168.2.3
                                          Nov 18, 2020 05:49:32.079448938 CET4973580192.168.2.3208.95.112.1
                                          Nov 18, 2020 05:49:36.519959927 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:49:36.753957987 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:49:36.774738073 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:49:36.774939060 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:49:58.611615896 CET4973580192.168.2.3208.95.112.1
                                          Nov 18, 2020 05:49:58.642582893 CET8049735208.95.112.1192.168.2.3
                                          Nov 18, 2020 05:50:01.787627935 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:50:02.125547886 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:50:27.009057045 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:50:27.009284019 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:50:27.133411884 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:50:27.365962982 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:50:52.246691942 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:50:52.246948004 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:50:52.373559952 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:50:52.606232882 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:51:17.475369930 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:51:17.475509882 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:51:17.610186100 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:51:17.842860937 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:51:42.710359097 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:51:42.710527897 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:51:42.846751928 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:51:43.079406023 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:07.948128939 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:07.948257923 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:08.083033085 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:08.315323114 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:33.186500072 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:33.188303947 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:33.320658922 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:33.552930117 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:35.871159077 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:35.871495008 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:35.871567011 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:35.871581078 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:35.871627092 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:35.871773005 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.104974985 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105020046 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105078936 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105122089 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105211020 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105252981 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.105282068 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.105376005 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105456114 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105468988 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.105578899 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.105665922 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.339184999 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.339503050 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.339589119 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.339943886 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340055943 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340131998 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.340162992 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340217113 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340281963 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.340287924 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340622902 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340780973 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340825081 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340882063 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340892076 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.340925932 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.340977907 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.341006041 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.341070890 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.341137886 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.341173887 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.341243982 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.341303110 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.572417021 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.572464943 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.572628021 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.573127985 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.573169947 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.573254108 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.575958967 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.576350927 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.576445103 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.576741934 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.576941013 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.576981068 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.577019930 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.577415943 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.577507019 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.577735901 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.577775002 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.577835083 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.577862978 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.577883959 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.577944040 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.577972889 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.577989101 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578041077 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578064919 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.578078032 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578128099 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578146935 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.578166962 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578222990 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578252077 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.578263998 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578322887 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578353882 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.578372002 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578430891 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578450918 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.578475952 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578557014 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578557014 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.578653097 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578712940 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578722954 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.578831911 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.578911066 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.579003096 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.579041958 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.579108000 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.805301905 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.805377960 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.805428028 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.805514097 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.805568933 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.805664062 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.805679083 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.805968046 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.806047916 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.806055069 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.806109905 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.806205988 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.808546066 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.808640003 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.808692932 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.808716059 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.808768034 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.808852911 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.809614897 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.809964895 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810024023 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810045004 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.810081959 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810139894 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810151100 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.810195923 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810254097 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810271025 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.810314894 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810396910 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.810827971 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810889006 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810945034 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.810987949 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.811168909 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.811250925 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.811292887 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.811615944 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.811690092 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.811729908 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.811810017 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.811882973 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.812048912 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812131882 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812184095 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812222958 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.812235117 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812287092 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812335014 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812361002 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.812422991 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.812772989 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812891006 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812935114 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.812983990 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813014984 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.813034058 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813071012 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.813112020 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813163042 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813191891 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.813226938 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813276052 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813287020 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.813328028 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813374996 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813393116 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.813457966 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813507080 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813539028 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.813559055 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813615084 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813632011 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.813669920 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813725948 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:36.813739061 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:36.866559982 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.039053917 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039098978 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039175987 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039208889 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.039335012 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039424896 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.039427042 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039503098 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039570093 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039572001 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.039639950 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.039707899 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.045463085 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.045490980 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.045583010 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.045629978 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.045689106 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.045773983 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.045958042 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046075106 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046152115 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.046154022 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046214104 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046267033 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046289921 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.046339035 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046386957 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046408892 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.046471119 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046552896 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046608925 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.046711922 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046787977 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046802998 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.046904087 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046983004 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.046983957 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.047193050 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.047265053 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.047271967 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.047393084 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.047471046 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.047508955 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.047535896 CET478249736185.244.26.221192.168.2.3
                                          Nov 18, 2020 05:52:37.047621965 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.404109001 CET497364782192.168.2.3185.244.26.221
                                          Nov 18, 2020 05:52:37.686585903 CET478249736185.244.26.221192.168.2.3

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 18, 2020 05:47:50.012521982 CET5014153192.168.2.38.8.8.8
                                          Nov 18, 2020 05:47:50.048382998 CET53501418.8.8.8192.168.2.3
                                          Nov 18, 2020 05:47:51.043196917 CET5302353192.168.2.38.8.8.8
                                          Nov 18, 2020 05:47:51.070591927 CET53530238.8.8.8192.168.2.3
                                          Nov 18, 2020 05:47:52.042040110 CET4956353192.168.2.38.8.8.8
                                          Nov 18, 2020 05:47:52.069349051 CET53495638.8.8.8192.168.2.3
                                          Nov 18, 2020 05:47:52.983020067 CET5135253192.168.2.38.8.8.8
                                          Nov 18, 2020 05:47:53.010381937 CET53513528.8.8.8192.168.2.3
                                          Nov 18, 2020 05:47:53.781693935 CET5934953192.168.2.38.8.8.8
                                          Nov 18, 2020 05:47:53.809468031 CET53593498.8.8.8192.168.2.3
                                          Nov 18, 2020 05:47:56.386013985 CET5708453192.168.2.38.8.8.8
                                          Nov 18, 2020 05:47:56.413583040 CET53570848.8.8.8192.168.2.3
                                          Nov 18, 2020 05:47:59.936918020 CET5882353192.168.2.38.8.8.8
                                          Nov 18, 2020 05:47:59.964804888 CET53588238.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:01.808809042 CET5756853192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:01.844299078 CET53575688.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:02.866597891 CET5054053192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:02.893863916 CET53505408.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:05.870398998 CET5436653192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:05.897926092 CET53543668.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:05.942739964 CET5303453192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:05.970174074 CET53530348.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:06.722620010 CET5776253192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:06.750351906 CET53577628.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:09.962953091 CET5543553192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:09.990643024 CET53554358.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:11.889908075 CET5071353192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:11.917452097 CET53507138.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:12.983668089 CET5613253192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:13.011457920 CET53561328.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:14.170641899 CET5898753192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:14.222070932 CET53589878.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:18.481765032 CET5657953192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:18.509390116 CET53565798.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:19.676497936 CET6063353192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:19.720848083 CET53606338.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:20.004332066 CET6129253192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:20.032116890 CET53612928.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:29.786113024 CET6361953192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:29.824052095 CET53636198.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:39.943408012 CET6493853192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:39.971239090 CET53649388.8.8.8192.168.2.3
                                          Nov 18, 2020 05:48:42.993231058 CET6194653192.168.2.38.8.8.8
                                          Nov 18, 2020 05:48:43.030543089 CET53619468.8.8.8192.168.2.3
                                          Nov 18, 2020 05:49:14.649454117 CET6491053192.168.2.38.8.8.8
                                          Nov 18, 2020 05:49:14.677381039 CET53649108.8.8.8192.168.2.3
                                          Nov 18, 2020 05:49:15.810158968 CET5212353192.168.2.38.8.8.8
                                          Nov 18, 2020 05:49:15.854407072 CET53521238.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:30.843565941 CET5613053192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:30.895143986 CET53561308.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:31.429007053 CET5633853192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:31.467190981 CET53563388.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:31.871423006 CET5942053192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:31.907816887 CET53594208.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:32.373737097 CET5878453192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:32.422290087 CET53587848.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:32.810376883 CET6397853192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:32.845983982 CET53639788.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:33.219400883 CET6293853192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:33.255281925 CET53629388.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:33.778590918 CET5570853192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:33.814464092 CET53557088.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:34.817584991 CET5680353192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:34.853290081 CET53568038.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:35.515963078 CET5714553192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:35.551986933 CET53571458.8.8.8192.168.2.3
                                          Nov 18, 2020 05:50:35.847608089 CET5535953192.168.2.38.8.8.8
                                          Nov 18, 2020 05:50:35.874603033 CET53553598.8.8.8192.168.2.3
                                          Nov 18, 2020 05:52:31.505094051 CET5830653192.168.2.38.8.8.8
                                          Nov 18, 2020 05:52:31.542376995 CET53583068.8.8.8192.168.2.3
                                          Nov 18, 2020 05:52:32.180982113 CET6412453192.168.2.38.8.8.8
                                          Nov 18, 2020 05:52:32.226928949 CET53641248.8.8.8192.168.2.3
                                          Nov 18, 2020 05:52:35.734662056 CET4936153192.168.2.38.8.8.8
                                          Nov 18, 2020 05:52:35.778562069 CET53493618.8.8.8192.168.2.3
                                          Nov 18, 2020 05:52:38.909137964 CET6315053192.168.2.38.8.8.8
                                          Nov 18, 2020 05:52:38.944977999 CET53631508.8.8.8192.168.2.3
                                          Nov 18, 2020 05:52:39.208183050 CET5327953192.168.2.38.8.8.8
                                          Nov 18, 2020 05:52:39.244232893 CET53532798.8.8.8192.168.2.3

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Nov 18, 2020 05:48:18.481765032 CET192.168.2.38.8.8.80xda1dStandard query (0)ip-api.comA (IP address)IN (0x0001)
                                          Nov 18, 2020 05:48:19.676497936 CET192.168.2.38.8.8.80x43a3Standard query (0)devils.shacknet.usA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Nov 18, 2020 05:48:18.509390116 CET8.8.8.8192.168.2.30xda1dNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)
                                          Nov 18, 2020 05:48:19.720848083 CET8.8.8.8192.168.2.30x43a3No error (0)devils.shacknet.us185.244.26.221A (IP address)IN (0x0001)

                                          HTTP Request Dependency Graph

                                          • ip-api.com

                                          HTTP Packets

                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.349735208.95.112.180C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          TimestampkBytes transferredDirectionData
                                          Nov 18, 2020 05:48:18.556812048 CET339OUTGET /json/ HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                                          Host: ip-api.com
                                          Connection: Keep-Alive
                                          Nov 18, 2020 05:48:18.587726116 CET339INHTTP/1.1 200 OK
                                          Date: Wed, 18 Nov 2020 04:48:17 GMT
                                          Content-Type: application/json; charset=utf-8
                                          Content-Length: 281
                                          Access-Control-Allow-Origin: *
                                          X-Ttl: 60
                                          X-Rl: 44
                                          Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 43 48 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 48 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 5a 75 72 69 63 68 22 2c 22 63 69 74 79 22 3a 22 5a 75 72 69 63 68 22 2c 22 7a 69 70 22 3a 22 38 31 35 32 22 2c 22 6c 61 74 22 3a 34 37 2e 34 33 2c 22 6c 6f 6e 22 3a 38 2e 35 37 31 38 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 45 75 72 6f 70 65 2f 5a 75 72 69 63 68 22 2c 22 69 73 70 22 3a 22 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 6f 72 67 22 3a 22 43 64 6e 37 37 20 5a 55 52 20 49 54 58 22 2c 22 61 73 22 3a 22 41 53 36 30 30 36 38 20 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 22 71 75 65 72 79 22 3a 22 38 34 2e 31 37 2e 35 32 2e 34 30 22 7d
                                          Data Ascii: {"status":"success","country":"Switzerland","countryCode":"CH","region":"ZH","regionName":"Zurich","city":"Zurich","zip":"8152","lat":47.43,"lon":8.5718,"timezone":"Europe/Zurich","isp":"Datacamp Limited","org":"Cdn77 ZUR ITX","as":"AS60068 Datacamp Limited","query":"84.17.52.40"}


                                          Code Manipulations

                                          Statistics

                                          CPU Usage

                                          Click to jump to process

                                          Memory Usage

                                          Click to jump to process

                                          High Level Behavior Distribution

                                          Click to dive into process behavior distribution

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:05:47:44
                                          Start date:18/11/2020
                                          Path:C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe'
                                          Imagebase:0xb40000
                                          File size:645440 bytes
                                          MD5 hash:DC8D9C9A86FE4830053697C1DC59DC6F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.269160984.0000000004035000.00000004.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:05:48:15
                                          Start date:18/11/2020
                                          Path:C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\CDC GUIDES COVID-19 Second Outbreak Warning release.exe
                                          Imagebase:0xb00000
                                          File size:645440 bytes
                                          MD5 hash:DC8D9C9A86FE4830053697C1DC59DC6F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000005.00000002.831738365.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:05:48:25
                                          Start date:18/11/2020
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
                                          Imagebase:0x340000
                                          File size:645440 bytes
                                          MD5 hash:DC8D9C9A86FE4830053697C1DC59DC6F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000E.00000002.355201046.00000000037C5000.00000004.00000001.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 12%, ReversingLabs
                                          Reputation:low

                                          General

                                          Start time:05:48:34
                                          Start date:18/11/2020
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
                                          Imagebase:0x600000
                                          File size:645440 bytes
                                          MD5 hash:DC8D9C9A86FE4830053697C1DC59DC6F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 0000000F.00000002.372345849.0000000003BE5000.00000004.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:05:48:54
                                          Start date:18/11/2020
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          Imagebase:0xdf0000
                                          File size:645440 bytes
                                          MD5 hash:DC8D9C9A86FE4830053697C1DC59DC6F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000014.00000002.358547843.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:05:49:03
                                          Start date:18/11/2020
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                          Imagebase:0xca0000
                                          File size:645440 bytes
                                          MD5 hash:DC8D9C9A86FE4830053697C1DC59DC6F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000015.00000002.376779243.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:05:52:36
                                          Start date:18/11/2020
                                          Path:C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Local\Temp\9FFWrx9i8Kuq.exe
                                          Imagebase:0xf20000
                                          File size:287120 bytes
                                          MD5 hash:082B27BB1AAA169A5D0C4CD536976F99
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          Reputation:low

                                          Disassembly

                                          Code Analysis

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:13%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:3.1%
                                            Total number of Nodes:97
                                            Total number of Limit Nodes:4

                                            Graph

                                            execution_graph 21258 5d9e7d8 21262 5d9e7fc 21258->21262 21266 5d9ec10 21258->21266 21259 5d9e7f9 21265 5d9e805 GetUserNameA 21262->21265 21264 5d9ed6e 21265->21264 21269 5d9ec69 GetUserNameA 21266->21269 21268 5d9ed6e 21269->21268 21319 2d57130 21321 2d5713c 21319->21321 21320 2d571c5 21321->21320 21324 5d942f0 21321->21324 21328 5d942e0 21321->21328 21326 5d9430c 21324->21326 21325 5d943f4 21325->21321 21326->21325 21332 617c838 21326->21332 21330 5d942f0 21328->21330 21329 5d943f4 21329->21321 21330->21329 21331 617c838 CopyFileW 21330->21331 21331->21329 21334 617c883 CopyFileW 21332->21334 21335 617c8e0 21334->21335 21335->21325 21368 2d5b7a0 21369 2d5b7be 21368->21369 21372 2d59bb8 21369->21372 21371 2d5b7f5 21373 2d5d2c0 LoadLibraryA 21372->21373 21375 2d5d3b9 21373->21375 21336 5d9da7f 21338 5d9cc28 WriteProcessMemory 21336->21338 21339 5d9cc30 WriteProcessMemory 21336->21339 21337 5d9d4a7 21338->21337 21339->21337 21306 5d9db8e 21307 5d9d43e 21306->21307 21307->21306 21308 5d9d4a7 21307->21308 21311 2d5d590 21307->21311 21315 2d5d589 21307->21315 21312 2d5d5d0 ResumeThread 21311->21312 21314 2d5d601 21312->21314 21314->21307 21316 2d5d590 ResumeThread 21315->21316 21318 2d5d601 21316->21318 21318->21307 21270 5d9dfd1 21274 5d9cc28 21270->21274 21278 5d9cc30 21270->21278 21271 5d9d4a7 21275 5d9cc30 WriteProcessMemory 21274->21275 21277 5d9cccf 21275->21277 21277->21271 21279 5d9cc78 WriteProcessMemory 21278->21279 21281 5d9cccf 21279->21281 21281->21271 21282 5d9e750 21286 5d9ca98 21282->21286 21290 5d9ca91 21282->21290 21283 5d9e76c 21287 5d9cadd SetThreadContext 21286->21287 21289 5d9cb25 21287->21289 21289->21283 21291 5d9ca98 SetThreadContext 21290->21291 21293 5d9cb25 21291->21293 21293->21283 21376 5d9d460 21380 5d9cf58 21376->21380 21384 5d9cf4c 21376->21384 21381 5d9cfe1 CreateProcessA 21380->21381 21383 5d9d1a3 21381->21383 21385 5d9cfe1 CreateProcessA 21384->21385 21387 5d9d1a3 21385->21387 21294 5d9de52 21298 5d9cd19 21294->21298 21302 5d9cd20 21294->21302 21295 5d9d4a7 21299 5d9cd20 ReadProcessMemory 21298->21299 21301 5d9cdaf 21299->21301 21301->21295 21303 5d9cd6b ReadProcessMemory 21302->21303 21305 5d9cdaf 21303->21305 21305->21295 21388 5d9f362 21390 5d9ca98 SetThreadContext 21388->21390 21391 5d9ca91 SetThreadContext 21388->21391 21389 5d9f37c 21390->21389 21391->21389 21340 5d9d635 21341 5d9d63f 21340->21341 21343 5d9d911 21341->21343 21344 5d9cc28 WriteProcessMemory 21341->21344 21345 5d9cc30 WriteProcessMemory 21341->21345 21342 5d9daea 21344->21342 21345->21342 21346 5d9d834 21350 5d9e780 21346->21350 21354 5d9e770 21346->21354 21347 5d9d4a7 21360 5d9cb68 21350->21360 21364 5d9cb70 21350->21364 21351 5d9e797 21351->21347 21355 5d9e786 21354->21355 21357 5d9e79a 21354->21357 21356 5d9e797 21355->21356 21358 5d9cb68 VirtualAllocEx 21355->21358 21359 5d9cb70 VirtualAllocEx 21355->21359 21356->21347 21357->21347 21358->21356 21359->21356 21361 5d9cb70 VirtualAllocEx 21360->21361 21363 5d9cbed 21361->21363 21363->21351 21365 5d9cbb0 VirtualAllocEx 21364->21365 21367 5d9cbed 21365->21367 21367->21351

                                            Executed Functions

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 186 5d94660-5d9466c 187 5d94672-5d94677 186->187 188 5d95546-5d9554e 186->188 189 5d94679-5d94682 187->189 190 5d946a0-5d946c0 187->190 189->188 191 5d94688-5d94692 189->191 190->188 195 5d946c6-5d94796 190->195 193 5d94d49-5d94d59 191->193 445 5d94d5b call 5d95e48 193->445 446 5d94d5b call 5d95e37 193->446 253 5d9497a-5d949ab 195->253 254 5d9479c-5d947a8 195->254 198 5d94d61-5d94db5 205 5d94ded-5d94dff 198->205 206 5d94db7-5d94de4 198->206 211 5d94e05-5d94e31 205->211 212 5d94ea4-5d94ee2 205->212 206->205 221 5d94de6 206->221 222 5d9504b-5d9507d 211->222 223 5d94e37-5d94e40 211->223 234 5d94f5b-5d94f95 212->234 235 5d94ee4-5d94f59 212->235 221->205 241 5d95228-5d9523a 222->241 223->188 225 5d94e46-5d94e66 223->225 225->188 233 5d94e6c-5d94e8e 225->233 255 5d94e90 233->255 256 5d94e93-5d94e9d 233->256 251 5d94f9c-5d94fa7 234->251 235->251 248 5d95240-5d95246 241->248 249 5d95082-5d950a3 241->249 447 5d95248 call 5d96011 248->447 448 5d95248 call 5d96040 248->448 264 5d950a9 249->264 265 5d95227 249->265 251->222 257 5d94fad-5d94fb6 251->257 298 5d949ad-5d949d9 253->298 299 5d94a02-5d94a33 253->299 254->188 260 5d947ae-5d947fd 254->260 255->256 256->223 263 5d94e9f 256->263 257->188 262 5d94fbc-5d94fd6 257->262 330 5d9480a-5d94816 260->330 331 5d947ff-5d94808 260->331 261 5d9524e-5d95271 292 5d95502-5d95519 261->292 294 5d94fd8-5d94fea 262->294 295 5d9500c-5d9501e 262->295 263->222 269 5d951b9-5d951e2 264->269 270 5d95148-5d95189 264->270 271 5d9510a-5d95143 264->271 272 5d950cd-5d95105 264->272 273 5d9518e-5d951b7 264->273 274 5d951fe-5d95220 264->274 275 5d950b0-5d950bc 264->275 276 5d951e4-5d951f0 264->276 265->241 269->265 270->265 271->265 272->265 273->265 274->265 275->188 279 5d950c2-5d950c8 275->279 276->188 281 5d951f6-5d951fc 276->281 279->265 281->265 324 5d95524-5d9553b 292->324 294->188 301 5d94ff0-5d9500a 294->301 295->188 304 5d95024-5d95034 295->304 333 5d949db-5d949de 298->333 334 5d949e5-5d94a00 298->334 328 5d94a39-5d94ad6 299->328 329 5d94b35-5d94b42 299->329 322 5d9503b-5d95045 301->322 304->322 322->222 322->257 324->188 395 5d94af8-5d94afb 328->395 396 5d94ad8-5d94af6 328->396 335 5d94b81-5d94bc2 329->335 336 5d94b44-5d94b7b 329->336 344 5d94818-5d9481d 330->344 345 5d94822-5d9482e 330->345 331->330 333->334 337 5d949e0-5d949e2 333->337 334->298 334->299 362 5d94bc8-5d94bf8 335->362 363 5d94d3a-5d94d41 335->363 336->335 337->334 348 5d94962-5d94974 344->348 353 5d9483a-5d94846 345->353 354 5d94830-5d94835 345->354 348->253 348->254 358 5d94848-5d9484d 353->358 359 5d94852-5d9485e 353->359 354->348 358->348 367 5d9486a-5d94876 359->367 368 5d94860-5d94865 359->368 362->292 376 5d94bfe-5d94c06 362->376 363->193 372 5d94878-5d9487d 367->372 373 5d94882-5d9488e 367->373 368->348 372->348 378 5d9489a-5d948a6 373->378 379 5d94890-5d94895 373->379 376->188 381 5d94c0c-5d94c13 376->381 393 5d948a8-5d948ad 378->393 394 5d948b2-5d948be 378->394 379->348 382 5d94c1f-5d94c29 381->382 383 5d94c15-5d94c1a 381->383 382->324 384 5d94c2f 382->384 387 5d94d1f-5d94d34 383->387 388 5d94c58-5d94c7a 384->388 389 5d94c7f-5d94c9e 384->389 390 5d94cc1-5d94ce8 384->390 391 5d94ca0-5d94cbf 384->391 392 5d94c36-5d94c53 384->392 387->362 387->363 418 5d94d17 388->418 389->418 420 5d94cea-5d94d01 390->420 421 5d94d11 390->421 391->418 392->418 393->348 409 5d948ca-5d948d6 394->409 410 5d948c0-5d948c5 394->410 398 5d94afd-5d94b0c 395->398 399 5d94b0e 395->399 408 5d94b1a-5d94b2f 396->408 398->408 399->408 408->328 408->329 422 5d948d8-5d948dd 409->422 423 5d948e2-5d948ee 409->423 410->348 418->387 420->188 427 5d94d07-5d94d0f 420->427 421->418 422->348 428 5d948f0-5d948f5 423->428 429 5d948f7-5d94903 423->429 427->420 427->421 428->348 431 5d9490c-5d94918 429->431 432 5d94905-5d9490a 429->432 434 5d9491a-5d9491f 431->434 435 5d94921-5d9492d 431->435 432->348 434->348 437 5d9492f-5d94934 435->437 438 5d94936-5d94942 435->438 437->348 440 5d9494b-5d94957 438->440 441 5d94944-5d94949 438->441 443 5d94959-5d9495e 440->443 444 5d94960 440->444 441->348 443->348 444->348 445->198 446->198 447->261 448->261
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \l
                                            • API String ID: 0-3304691678
                                            • Opcode ID: 5c2d4dbf162cd253e61a334bff1b9bbc986779cfd02de71bf15c6d71cf62836a
                                            • Instruction ID: f64ca5085ca8fda9900c6684f35b39a0d2d01d5842a59155a82ef67b975c6550
                                            • Opcode Fuzzy Hash: 5c2d4dbf162cd253e61a334bff1b9bbc986779cfd02de71bf15c6d71cf62836a
                                            • Instruction Fuzzy Hash: D8722C34A00614CFCB68DF65D894AADB7B2FF89304F1185AAD54A9B365DB30EC81CF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 563 5d9ec10-5d9ec77 565 5d9ec79-5d9ec9e 563->565 566 5d9ece6-5d9ecea 563->566 572 5d9ecce-5d9ecd3 565->572 573 5d9eca0-5d9eca2 565->573 567 5d9ecec-5d9ed2a 566->567 568 5d9ed2e-5d9ed6c GetUserNameA 566->568 567->568 569 5d9ed6e-5d9ed74 568->569 570 5d9ed75-5d9ed92 568->570 569->570 582 5d9eda8-5d9edcf 570->582 583 5d9ed94-5d9eda0 570->583 581 5d9ecd5-5d9ece1 572->581 575 5d9ecc4-5d9eccc 573->575 576 5d9eca4-5d9ecae 573->576 575->581 579 5d9ecb0 576->579 580 5d9ecb2-5d9ecc0 576->580 579->580 580->580 586 5d9ecc2 580->586 581->566 589 5d9eddf 582->589 590 5d9edd1-5d9edd5 582->590 583->582 586->575 594 5d9ede0 589->594 590->589 592 5d9edd7 590->592 592->589 594->594
                                            APIs
                                            • GetUserNameA.ADVAPI32(00000000), ref: 05D9ED5C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: 14c11688b6397ab76dddfea34625819d5f0ec5b933c325c0e4b7f0c7f6fd6bdd
                                            • Instruction ID: 8eb4e802f6e5b831b62b3f0a34ae7ffd2d98dd95693372680d2986a9ccf5cbb1
                                            • Opcode Fuzzy Hash: 14c11688b6397ab76dddfea34625819d5f0ec5b933c325c0e4b7f0c7f6fd6bdd
                                            • Instruction Fuzzy Hash: 13512670D042489FDB18DFA9C884B9EBBF5FF88304F25812AD816AB391DB749945CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 634 5d91fa8-5d91fc3 635 5d91fc9-5d91fd0 634->635 636 5d921f5-5d9221d 634->636 637 5d91fdc-5d91ffb 635->637 638 5d91fd2-5d91fdb 635->638 650 5d92224-5d92239 636->650 639 5d921e8-5d921f4 637->639 640 5d92001-5d92022 637->640 642 5d9202a-5d92058 640->642 643 5d92024-5d92028 640->643 647 5d9205d-5d920e3 call 5d911e0 642->647 643->642 644 5d9205a 643->644 644->647 707 5d920e5 call 5d91fa8 647->707 708 5d920e5 call 5d91f9a 647->708 709 5d920e5 call 5d92382 647->709 654 5d92289-5d9233c 650->654 655 5d9223b-5d92285 650->655 676 5d9233e-5d92344 654->676 677 5d92345-5d92390 654->677 655->654 663 5d920eb-5d920f9 call 5d916f0 668 5d92158-5d9215c 663->668 669 5d920fb-5d920fd 663->669 671 5d9219f-5d921a6 668->671 672 5d9215e-5d9216b 668->672 673 5d92141-5d92150 669->673 674 5d921a8-5d921af 671->674 675 5d921ba-5d921be 671->675 679 5d9216d-5d92172 672->679 680 5d9217f-5d92191 672->680 673->668 678 5d92152 673->678 674->675 681 5d921b1 674->681 684 5d921e0-5d921e5 675->684 685 5d921c0-5d921c7 675->685 676->677 698 5d9239a-5d9239e 677->698 699 5d92392 677->699 682 5d920ff-5d9210b 678->682 683 5d92154-5d92156 678->683 679->680 686 5d92174-5d9217d 679->686 680->684 693 5d92193-5d9219d 680->693 681->675 682->650 690 5d92111-5d92140 682->690 683->668 683->682 684->639 685->684 688 5d921c9-5d921df 685->688 686->684 690->673 693->684 701 5d923ba 698->701 702 5d923a0-5d923ac 698->702 699->698 706 5d923bb 701->706 703 5d923ae-5d923b1 702->703 704 5d923b4 702->704 703->704 704->701 706->706 707->663 708->663 709->663
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: <l
                                            • API String ID: 0-2278483159
                                            • Opcode ID: c32a5e77bbc5e3f1ac97466d1edbfad24b652568d73ff41f34dd87fdb29d2648
                                            • Instruction ID: b3974f381355f89d10b2ce853a8c0075ac9f17f95b1175fc5aeb8b0960159b5a
                                            • Opcode Fuzzy Hash: c32a5e77bbc5e3f1ac97466d1edbfad24b652568d73ff41f34dd87fdb29d2648
                                            • Instruction Fuzzy Hash: 1CD14C74E002099FCF18DFA9C884AAEFBF2FF48314F15855AE515AB351DB34A946CB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e56fd54f3a731fa8c226fb7537b7a2538f7e5ea6075251bf7e170cd92d1e517
                                            • Instruction ID: 9ff8df91a0679c0547bc366fa71f20b6894a2de16b3abf2a066bab619fb56116
                                            • Opcode Fuzzy Hash: 9e56fd54f3a731fa8c226fb7537b7a2538f7e5ea6075251bf7e170cd92d1e517
                                            • Instruction Fuzzy Hash: 7DB12B70E04219DFDF14CFA9D8897EEBBF2BF88314F14812AD819A7254EB749845CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a8eceb0796715f7a5bc24d1d9e481df37d25a28bf7bf45df311807e804709bb8
                                            • Instruction ID: fcfa67323502182c05060cd5425661851b628f40f821b3c40bede058a0570530
                                            • Opcode Fuzzy Hash: a8eceb0796715f7a5bc24d1d9e481df37d25a28bf7bf45df311807e804709bb8
                                            • Instruction Fuzzy Hash: F7B13B70E042199FDF14CFA9E8897AEBBF2BF88358F14812AD419E7254DB749845CB81
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 152 5d9e7fc-5d9ec77 156 5d9ec79-5d9ec9e 152->156 157 5d9ece6-5d9ecea 152->157 163 5d9ecce-5d9ecd3 156->163 164 5d9eca0-5d9eca2 156->164 158 5d9ecec-5d9ed2a 157->158 159 5d9ed2e-5d9ed6c GetUserNameA 157->159 158->159 160 5d9ed6e-5d9ed74 159->160 161 5d9ed75-5d9ed92 159->161 160->161 173 5d9eda8-5d9edcf 161->173 174 5d9ed94-5d9eda0 161->174 172 5d9ecd5-5d9ece1 163->172 166 5d9ecc4-5d9eccc 164->166 167 5d9eca4-5d9ecae 164->167 166->172 170 5d9ecb0 167->170 171 5d9ecb2-5d9ecc0 167->171 170->171 171->171 177 5d9ecc2 171->177 172->157 180 5d9eddf 173->180 181 5d9edd1-5d9edd5 173->181 174->173 177->166 185 5d9ede0 180->185 181->180 183 5d9edd7 181->183 183->180 185->185
                                            APIs
                                            • GetUserNameA.ADVAPI32(00000000), ref: 05D9ED5C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: d3bd5915d2ac012a5fd0714065b69f1062fcd5f6586c52721bc118a13fbd6911
                                            • Instruction ID: 95557aba7029b9de07b260540b70f61d313ccdc6b05e20937ef7e103e380e0b5
                                            • Opcode Fuzzy Hash: d3bd5915d2ac012a5fd0714065b69f1062fcd5f6586c52721bc118a13fbd6911
                                            • Instruction Fuzzy Hash: 3F61AC70D042488FDB19DFA9C894BDDBBF1FF49304F14806AD446AB391DB789849CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 449 5d9cf4c-5d9cfed 451 5d9cfef-5d9cff9 449->451 452 5d9d026-5d9d046 449->452 451->452 453 5d9cffb-5d9cffd 451->453 459 5d9d048-5d9d052 452->459 460 5d9d07f-5d9d0ae 452->460 454 5d9cfff-5d9d009 453->454 455 5d9d020-5d9d023 453->455 457 5d9d00b 454->457 458 5d9d00d-5d9d01c 454->458 455->452 457->458 458->458 461 5d9d01e 458->461 459->460 462 5d9d054-5d9d056 459->462 466 5d9d0b0-5d9d0ba 460->466 467 5d9d0e7-5d9d1a1 CreateProcessA 460->467 461->455 464 5d9d079-5d9d07c 462->464 465 5d9d058-5d9d062 462->465 464->460 468 5d9d064 465->468 469 5d9d066-5d9d075 465->469 466->467 470 5d9d0bc-5d9d0be 466->470 480 5d9d1aa-5d9d230 467->480 481 5d9d1a3-5d9d1a9 467->481 468->469 469->469 471 5d9d077 469->471 472 5d9d0e1-5d9d0e4 470->472 473 5d9d0c0-5d9d0ca 470->473 471->464 472->467 475 5d9d0cc 473->475 476 5d9d0ce-5d9d0dd 473->476 475->476 476->476 477 5d9d0df 476->477 477->472 491 5d9d240-5d9d244 480->491 492 5d9d232-5d9d236 480->492 481->480 494 5d9d254-5d9d258 491->494 495 5d9d246-5d9d24a 491->495 492->491 493 5d9d238 492->493 493->491 497 5d9d268-5d9d26c 494->497 498 5d9d25a-5d9d25e 494->498 495->494 496 5d9d24c 495->496 496->494 500 5d9d27e-5d9d285 497->500 501 5d9d26e-5d9d274 497->501 498->497 499 5d9d260 498->499 499->497 502 5d9d29c 500->502 503 5d9d287-5d9d296 500->503 501->500 505 5d9d29d 502->505 503->502 505->505
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05D9D18E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: e79f08aa19fc7c631ace23434242870289bbf76f557eec8a00c284cfd39653f1
                                            • Instruction ID: 267e569d5dadf2377868540e8353f9b361aedb118cab5935bc12eb0c2a8c75bc
                                            • Opcode Fuzzy Hash: e79f08aa19fc7c631ace23434242870289bbf76f557eec8a00c284cfd39653f1
                                            • Instruction Fuzzy Hash: 41918C71D04219CFDF14DFA8C881BEDBBB2BF48314F55856AE809A7280DB749986CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 506 5d9cf58-5d9cfed 508 5d9cfef-5d9cff9 506->508 509 5d9d026-5d9d046 506->509 508->509 510 5d9cffb-5d9cffd 508->510 516 5d9d048-5d9d052 509->516 517 5d9d07f-5d9d0ae 509->517 511 5d9cfff-5d9d009 510->511 512 5d9d020-5d9d023 510->512 514 5d9d00b 511->514 515 5d9d00d-5d9d01c 511->515 512->509 514->515 515->515 518 5d9d01e 515->518 516->517 519 5d9d054-5d9d056 516->519 523 5d9d0b0-5d9d0ba 517->523 524 5d9d0e7-5d9d1a1 CreateProcessA 517->524 518->512 521 5d9d079-5d9d07c 519->521 522 5d9d058-5d9d062 519->522 521->517 525 5d9d064 522->525 526 5d9d066-5d9d075 522->526 523->524 527 5d9d0bc-5d9d0be 523->527 537 5d9d1aa-5d9d230 524->537 538 5d9d1a3-5d9d1a9 524->538 525->526 526->526 528 5d9d077 526->528 529 5d9d0e1-5d9d0e4 527->529 530 5d9d0c0-5d9d0ca 527->530 528->521 529->524 532 5d9d0cc 530->532 533 5d9d0ce-5d9d0dd 530->533 532->533 533->533 534 5d9d0df 533->534 534->529 548 5d9d240-5d9d244 537->548 549 5d9d232-5d9d236 537->549 538->537 551 5d9d254-5d9d258 548->551 552 5d9d246-5d9d24a 548->552 549->548 550 5d9d238 549->550 550->548 554 5d9d268-5d9d26c 551->554 555 5d9d25a-5d9d25e 551->555 552->551 553 5d9d24c 552->553 553->551 557 5d9d27e-5d9d285 554->557 558 5d9d26e-5d9d274 554->558 555->554 556 5d9d260 555->556 556->554 559 5d9d29c 557->559 560 5d9d287-5d9d296 557->560 558->557 562 5d9d29d 559->562 560->559 562->562
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05D9D18E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: d7d749b522be281af1e85afd0fd58f644b3d847f2d980fadf9e7197e9432630c
                                            • Instruction ID: 39b53b0fd93be86699fa48459767b932245290ec8a685db84bf5f1f99955cf66
                                            • Opcode Fuzzy Hash: d7d749b522be281af1e85afd0fd58f644b3d847f2d980fadf9e7197e9432630c
                                            • Instruction Fuzzy Hash: 0B918D71D04219DFDF14DFA8C880BEDBBB2BF48304F54856AE809A7280DB749986CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 595 2d5d2b4-2d5d317 596 2d5d319-2d5d33e 595->596 597 2d5d36b-2d5d3b7 LoadLibraryA 595->597 596->597 602 2d5d340-2d5d342 596->602 600 2d5d3c0-2d5d3f1 597->600 601 2d5d3b9-2d5d3bf 597->601 609 2d5d401 600->609 610 2d5d3f3-2d5d3f7 600->610 601->600 604 2d5d365-2d5d368 602->604 605 2d5d344-2d5d34e 602->605 604->597 606 2d5d350 605->606 607 2d5d352-2d5d361 605->607 606->607 607->607 611 2d5d363 607->611 613 2d5d402 609->613 610->609 612 2d5d3f9 610->612 611->604 612->609 613->613
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 02D5D3A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.267617733.0000000002D50000.00000040.00000001.sdmp, Offset: 02D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2d50000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 2154c32e9d48c2a094d57f98ea7fb4d6765a27fffc2620a8b191182b1d15d678
                                            • Instruction ID: a03acd68c66122661c0c1fb17a35cfa437ae987461024ec0fdfbb94ebc469b1e
                                            • Opcode Fuzzy Hash: 2154c32e9d48c2a094d57f98ea7fb4d6765a27fffc2620a8b191182b1d15d678
                                            • Instruction Fuzzy Hash: 3D4129B0D106688FDB10CF99D88579DBBF2FB48304F14812AD855EB380D7B49845CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 614 2d59bb8-2d5d317 616 2d5d319-2d5d33e 614->616 617 2d5d36b-2d5d3b7 LoadLibraryA 614->617 616->617 622 2d5d340-2d5d342 616->622 620 2d5d3c0-2d5d3f1 617->620 621 2d5d3b9-2d5d3bf 617->621 629 2d5d401 620->629 630 2d5d3f3-2d5d3f7 620->630 621->620 624 2d5d365-2d5d368 622->624 625 2d5d344-2d5d34e 622->625 624->617 626 2d5d350 625->626 627 2d5d352-2d5d361 625->627 626->627 627->627 631 2d5d363 627->631 633 2d5d402 629->633 630->629 632 2d5d3f9 630->632 631->624 632->629 633->633
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 02D5D3A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.267617733.0000000002D50000.00000040.00000001.sdmp, Offset: 02D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2d50000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 765acf0284caa4cf4dcb0a494873bf058b6ef7ab58f80be2355e0e471c392d8d
                                            • Instruction ID: fa42f9b526740f8b52d4035ba43f707483bff468e713ad601405311eccc4cfa7
                                            • Opcode Fuzzy Hash: 765acf0284caa4cf4dcb0a494873bf058b6ef7ab58f80be2355e0e471c392d8d
                                            • Instruction Fuzzy Hash: 6E413AB0D106689FDB10CFA9D88579EBBF2FB48314F14812AD855EB380D7B4A845CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1331 5d9cc28-5d9cc7e 1334 5d9cc8e-5d9cccd WriteProcessMemory 1331->1334 1335 5d9cc80-5d9cc8c 1331->1335 1337 5d9cccf-5d9ccd5 1334->1337 1338 5d9ccd6-5d9cd06 1334->1338 1335->1334 1337->1338
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05D9CCC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 7cca70a0dbac6dba1ed7f7337250255d4c8af53cba150cd4de15de1cc2ca9be5
                                            • Instruction ID: fed460e2f6730b4d44e32ea41966bac72737b829b818fd356fb2432b72b7ba4d
                                            • Opcode Fuzzy Hash: 7cca70a0dbac6dba1ed7f7337250255d4c8af53cba150cd4de15de1cc2ca9be5
                                            • Instruction Fuzzy Hash: 202106B19043499FCF10DFAAC8847DEBBB5BF48214F14842AE919A7351DB789944CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1342 617c838-617c88a 1344 617c895-617c899 1342->1344 1345 617c88c-617c892 1342->1345 1346 617c8a1-617c8de CopyFileW 1344->1346 1347 617c89b-617c89e 1344->1347 1345->1344 1348 617c8e7-617c908 1346->1348 1349 617c8e0-617c8e6 1346->1349 1347->1346 1349->1348
                                            APIs
                                            • CopyFileW.KERNELBASE(?,00000000,?), ref: 0617C8D1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272808190.0000000006170000.00000040.00000001.sdmp, Offset: 06170000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6170000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: CopyFile
                                            • String ID:
                                            • API String ID: 1304948518-0
                                            • Opcode ID: b4b73311b803513b0d84efc1896cf55f75ed16241728754e474bf99dc7fe0eec
                                            • Instruction ID: 3c27e2bd39c1b0995cbc0d7b5e61839a2f1ea29c925c3e242844b64016c59d67
                                            • Opcode Fuzzy Hash: b4b73311b803513b0d84efc1896cf55f75ed16241728754e474bf99dc7fe0eec
                                            • Instruction Fuzzy Hash: 4E212AB1D016199FCB50CFAAD5847EEFBF5EF88320F14816AE818E7241D7749A44DBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1351 5d9cc30-5d9cc7e 1353 5d9cc8e-5d9cccd WriteProcessMemory 1351->1353 1354 5d9cc80-5d9cc8c 1351->1354 1356 5d9cccf-5d9ccd5 1353->1356 1357 5d9ccd6-5d9cd06 1353->1357 1354->1353 1356->1357
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05D9CCC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 78f339d2d3d4b61d375a7add37fbdde69d343ffc9d6394629a64625e76c11740
                                            • Instruction ID: 9b76f56f828cc95e24665ca3b067cd3a7e23f85404f04463a5a58b7924116969
                                            • Opcode Fuzzy Hash: 78f339d2d3d4b61d375a7add37fbdde69d343ffc9d6394629a64625e76c11740
                                            • Instruction Fuzzy Hash: EC21F5B19003499FCF10DFAAC884BDEBBF5BF48314F14842AE919A7651DB789944CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1372 5d9cd19-5d9cdad ReadProcessMemory 1376 5d9cdaf-5d9cdb5 1372->1376 1377 5d9cdb6-5d9cde6 1372->1377 1376->1377
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05D9CDA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 750dfbfe4c70addef4a0512890819ba1659548eb6be262b7ea1c182dbb646074
                                            • Instruction ID: 7ff648e9ee365ba76ff1a2fd13fd42580305b0bf5357b7a2987058dda6cdb6ed
                                            • Opcode Fuzzy Hash: 750dfbfe4c70addef4a0512890819ba1659548eb6be262b7ea1c182dbb646074
                                            • Instruction Fuzzy Hash: 5F2139B18003499FCF10DFAAC8807DEBBB5FF88314F14842AE519A7351D7789945CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1361 5d9ca91-5d9cae3 1364 5d9caf3-5d9cb23 SetThreadContext 1361->1364 1365 5d9cae5-5d9caf1 1361->1365 1367 5d9cb2c-5d9cb5c 1364->1367 1368 5d9cb25-5d9cb2b 1364->1368 1365->1364 1368->1367
                                            APIs
                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 05D9CB16
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: ContextThread
                                            • String ID:
                                            • API String ID: 1591575202-0
                                            • Opcode ID: 8b6a3e31cb2fb91d01d9a255ded24153c41ec98619b6364ed5c3193edddce965
                                            • Instruction ID: 5f88d57db2d3a4e804bcd2262bf09a80df6b5e5cdb5c3153f97be4687b706f7b
                                            • Opcode Fuzzy Hash: 8b6a3e31cb2fb91d01d9a255ded24153c41ec98619b6364ed5c3193edddce965
                                            • Instruction Fuzzy Hash: FE213871D043098FCB10DFAAC4847EEBBF4EF88258F14842AD519A7341DB78A945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05D9CDA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: d8a69231baa559fefe20f30d77aabda0b147f6f7a0bf5c1454e1f57dd2492cbc
                                            • Instruction ID: cd04cc15081457b7ee356a85b3a3893a46a85814759959cc27e390b557ee9122
                                            • Opcode Fuzzy Hash: d8a69231baa559fefe20f30d77aabda0b147f6f7a0bf5c1454e1f57dd2492cbc
                                            • Instruction Fuzzy Hash: B22119B18003499FCF10DFAAC8806DEBBB5FF48314F10842AE519A7251C7749945CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 05D9CB16
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: ContextThread
                                            • String ID:
                                            • API String ID: 1591575202-0
                                            • Opcode ID: 3f5e2d09cd4d4df430dbcc4b01fc95a9d9b6e12bcbd10fb547b5b6993c5e51ee
                                            • Instruction ID: c04b1421f01a1388c999c4a71db604d4108a04048f83bd864a0ecc71270aae3a
                                            • Opcode Fuzzy Hash: 3f5e2d09cd4d4df430dbcc4b01fc95a9d9b6e12bcbd10fb547b5b6993c5e51ee
                                            • Instruction Fuzzy Hash: 812135B1D043098FCB10DFAAC4847EEBBF4EF88264F14842AD519A7341CB78A945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05D9CBDE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: a087f689990d8175ee5dd9d2d36492fecbfdc23ca953b2aff297a680b8cd72d2
                                            • Instruction ID: 21d7a29bf7ace5d3bcf651d1a0f38e33cd563096698a62ee103d75c9c79f5105
                                            • Opcode Fuzzy Hash: a087f689990d8175ee5dd9d2d36492fecbfdc23ca953b2aff297a680b8cd72d2
                                            • Instruction Fuzzy Hash: 8A1159729042499BCF10DFAAC844BDFBBF5AF48314F14841AE519A7310CB759944CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05D9CBDE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: b6340e9ce1c24c648b184e7ebb84dd2670a453d24bf97827041686f322adb74a
                                            • Instruction ID: b96773940fdb09a9434a6f4fcd4826975601828898368f41c033e74f771b1d60
                                            • Opcode Fuzzy Hash: b6340e9ce1c24c648b184e7ebb84dd2670a453d24bf97827041686f322adb74a
                                            • Instruction Fuzzy Hash: B31137719042499FCF10DFAAD844BDFBBF5AF88324F14841AE525A7250CB759944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.267617733.0000000002D50000.00000040.00000001.sdmp, Offset: 02D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2d50000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 99a5ac2c0d26b51f1f5466e0a4aba267ac372fb99c74e6956ef84f634e77b96b
                                            • Instruction ID: a17b64f01c45bb2c0f8c6122f0113f7933b4921b22bd4b4c523c1098d80fe265
                                            • Opcode Fuzzy Hash: 99a5ac2c0d26b51f1f5466e0a4aba267ac372fb99c74e6956ef84f634e77b96b
                                            • Instruction Fuzzy Hash: CC1158B19043488BCB10DFAAC8447DFFBF5EF88228F24841AD519A7700CB74A945CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.267617733.0000000002D50000.00000040.00000001.sdmp, Offset: 02D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2d50000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 56af7f8e5fda9faf4f6133718cf0111d730ed0116954f3357f044358189b3455
                                            • Instruction ID: 873fc5cd22aed33779d5c98f83d9532b10899b4cce53de9d589a94ae85da6bea
                                            • Opcode Fuzzy Hash: 56af7f8e5fda9faf4f6133718cf0111d730ed0116954f3357f044358189b3455
                                            • Instruction Fuzzy Hash: CF113AB1D043488BCB10DFAAC4447DFFBF5AF88224F248419D519A7740CB74A945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.267617733.0000000002D50000.00000040.00000001.sdmp, Offset: 02D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2d50000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5fbf13fb2b42e7f35729dbec691a77430b25a315669b7bae7785c8d13e85d595
                                            • Instruction ID: 60df5560c7b750b151659cdeec3f84ad4b1e3e17fbc0142ad1a5c768ff2e032a
                                            • Opcode Fuzzy Hash: 5fbf13fb2b42e7f35729dbec691a77430b25a315669b7bae7785c8d13e85d595
                                            • Instruction Fuzzy Hash: 1A917F70E00619CFDF10CFA9C9917EEBBF2AF89348F248129D815AB754DBB49845CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0562ea00ba9625369878edc7f89e60125628768e7ba3a42d7c27f71488ae2ae6
                                            • Instruction ID: d2c0ac167e6b78b71c8f2d2fa1aea804c2f1921258c67c1570a8145c0e0e12d8
                                            • Opcode Fuzzy Hash: 0562ea00ba9625369878edc7f89e60125628768e7ba3a42d7c27f71488ae2ae6
                                            • Instruction Fuzzy Hash: A4816F32A09208CFDF18CB99D8847AEF7F2FB88304F08952BD15697645D735E885CB51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c2294a3917058253012ccd88967baf54fed98b8ca6c3f247bab775b6e7371f0
                                            • Instruction ID: e029726a9cb02530a5ce6e458b680446dff04b10842afb6bff9c0076cd921470
                                            • Opcode Fuzzy Hash: 4c2294a3917058253012ccd88967baf54fed98b8ca6c3f247bab775b6e7371f0
                                            • Instruction Fuzzy Hash: AE818B31A05209DFDF29CF99D8A97AABBF2FB85300F00852FD146A7644C374A985CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.272686153.0000000005D90000.00000040.00000001.sdmp, Offset: 05D90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5d90000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8bded037001d6638587414ed146cc20f71cf353187ed2b561c0b3a0ab2256044
                                            • Instruction ID: 1f566f1524a208c431c99e8b629f35a3f6b371852faea68524772e4702bbe556
                                            • Opcode Fuzzy Hash: 8bded037001d6638587414ed146cc20f71cf353187ed2b561c0b3a0ab2256044
                                            • Instruction Fuzzy Hash: B8816B71A05209DFDF29CF89D8A97AABBF2FB85304F04852FC146A7644C374E985CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:5.6%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:20
                                            Total number of Limit Nodes:1

                                            Graph

                                            execution_graph 27982 142ae80 27983 142ae83 27982->27983 27986 142928c 27983->27986 27985 142aed5 27988 142c9a0 LoadLibraryA 27986->27988 27989 142ca99 27988->27989 27990 1420448 27991 1420452 27990->27991 27993 1421db1 27990->27993 27994 1421dc5 27993->27994 27998 1421e90 27994->27998 28002 1421ea0 27994->28002 28000 1421ec7 27998->28000 27999 1421fa4 27999->27999 28000->27999 28006 1421a88 28000->28006 28004 1421ec7 28002->28004 28003 1421fa4 28003->28003 28004->28003 28005 1421a88 CreateActCtxA 28004->28005 28005->28003 28007 1422f30 CreateActCtxA 28006->28007 28009 1422ff3 28007->28009

                                            Executed Functions

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 22c1e6fb05e27de3d936282f179b4eb18ebd22f32e392d3111bafe5df726ebde
                                            • Instruction ID: 3d39f1df2272cbc24008eae96387a74d11423a487048cdfaa1e9336f38472763
                                            • Opcode Fuzzy Hash: 22c1e6fb05e27de3d936282f179b4eb18ebd22f32e392d3111bafe5df726ebde
                                            • Instruction Fuzzy Hash: EAA1C2761092708BCF9FCF70C865175BBE1BB86320B589D95C943BB51FC320995287AE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \l$\l$t%l$t%l
                                            • API String ID: 0-978669101
                                            • Opcode ID: 20670edb4ed3c13a761fd338edf649a90c8f25f375f8bca22afafc61c77370fd
                                            • Instruction ID: e1e7693eecd3b4398aad118ced42fd23614e6cef177b4a8b7f46137d7bd41aba
                                            • Opcode Fuzzy Hash: 20670edb4ed3c13a761fd338edf649a90c8f25f375f8bca22afafc61c77370fd
                                            • Instruction Fuzzy Hash: 9AC2E930FA57A0ABEEF40A184C91BB6A1DB6B50B65F14411EF641FA2C7CFF58DC48251
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \l$\l$t%l$t%l
                                            • API String ID: 0-978669101
                                            • Opcode ID: f7e809a34ce11992c22e91e6dfd7672c2d5eb98d235ebdfcf129a46b2d4fa635
                                            • Instruction ID: 96a8fb661685a5bc069cbd5943deb7b0e82d5fa6b9c6d16d463d444a84845261
                                            • Opcode Fuzzy Hash: f7e809a34ce11992c22e91e6dfd7672c2d5eb98d235ebdfcf129a46b2d4fa635
                                            • Instruction Fuzzy Hash: 3AC2E930FA17A1ABEEF40A184C91BB6A1DB6B50B25F14411EF641FA2C7CFF58DC48651
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \l$t%l
                                            • API String ID: 0-770256137
                                            • Opcode ID: bd890190749d9788bd74039958269229202a4985d17e704bfbe9260c41da18c8
                                            • Instruction ID: 9c71543a7a7014160a2b93933e086aaacff70b900409d961c213a3dea196cb42
                                            • Opcode Fuzzy Hash: bd890190749d9788bd74039958269229202a4985d17e704bfbe9260c41da18c8
                                            • Instruction Fuzzy Hash: 86B2B730FE1BA0ABEEF456695C96BFE508F6B50B14F10841AB601FA2C7CFF589C541A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2361 6730048-6730068 2362 673006f-6730071 2361->2362 2363 6730073-6730079 2362->2363 2364 6730089-67300bb 2362->2364 2365 673007b 2363->2365 2366 673007d-673007f 2363->2366 2369 67300be-67300c2 2364->2369 2365->2364 2366->2364 2370 67300c4-67300c9 2369->2370 2371 67300cb-67300d0 2369->2371 2372 67300d6-67300d9 2370->2372 2371->2372 2373 67300df-67300f3 2372->2373 2374 6730d8d-6730d97 2372->2374 2373->2369 2376 67300f5 2373->2376 2377 6730397-67303a6 2376->2377 2378 6730476-6730485 2376->2378 2379 67301d9-67301e8 2376->2379 2380 67302b8-67302c7 2376->2380 2381 67300fc-6730109 2376->2381 2382 6730d17-6730d3a 2377->2382 2386 67303ac-67303d2 2377->2386 2378->2382 2385 673048b-67304b1 2378->2385 2379->2382 2383 67301ee-6730214 2379->2383 2380->2382 2387 67302cd-67302f3 2380->2387 2381->2382 2384 673010f-6730135 2381->2384 2400 6730d40-6730d47 2382->2400 2401 6730f08-6730f0e 2382->2401 2415 6730216-673021b 2383->2415 2416 673021d-6730224 2383->2416 2417 6730137-673013c 2384->2417 2418 673013e-6730145 2384->2418 2408 67304b3-67304b8 2385->2408 2409 67304ba-67304c1 2385->2409 2410 67303d4-67303d9 2386->2410 2411 67303db-67303e2 2386->2411 2412 67302f5-67302fa 2387->2412 2413 67302fc-6730303 2387->2413 2400->2401 2407 6730d4d-6730d68 2400->2407 2407->2401 2435 6730d6e-6730d76 2407->2435 2419 6730523-6730550 2408->2419 2420 67304c3-67304e3 2409->2420 2421 67304e5-6730508 2409->2421 2422 6730444-6730471 2410->2422 2423 6730406-6730429 2411->2423 2424 67303e4-6730404 2411->2424 2425 6730365-6730392 2412->2425 2426 6730327-673034a 2413->2426 2427 6730305-6730325 2413->2427 2428 6730286-67302b3 2415->2428 2429 6730226-6730246 2416->2429 2430 6730248-673026b 2416->2430 2431 67301a7-67301d4 2417->2431 2432 6730147-6730167 2418->2432 2433 6730169-673018c 2418->2433 2419->2369 2420->2419 2467 6730520 2421->2467 2468 673050a-6730510 2421->2468 2422->2369 2469 6730441 2423->2469 2470 673042b-6730431 2423->2470 2424->2422 2425->2369 2471 6730362 2426->2471 2472 673034c-6730352 2426->2472 2427->2425 2428->2369 2429->2428 2473 6730283 2430->2473 2474 673026d-6730273 2430->2474 2431->2369 2432->2431 2475 67301a4 2433->2475 2476 673018e-6730194 2433->2476 2435->2401 2436 6730d7c-6730d85 2435->2436 2436->2374 2467->2419 2477 6730512 2468->2477 2478 6730514-6730516 2468->2478 2469->2422 2479 6730433 2470->2479 2480 6730435-6730437 2470->2480 2471->2425 2481 6730356-6730358 2472->2481 2482 6730354 2472->2482 2473->2428 2483 6730277-6730279 2474->2483 2484 6730275 2474->2484 2475->2431 2485 6730196 2476->2485 2486 6730198-673019a 2476->2486 2477->2467 2478->2467 2479->2469 2480->2469 2481->2471 2482->2471 2483->2473 2484->2473 2485->2475 2486->2475
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ?
                                            • API String ID: 0-1684325040
                                            • Opcode ID: 366c9f2ff7d3071940411c1c3336a022ee210cf9cdc94cb121acc5f9c0721f16
                                            • Instruction ID: 10f9dd455ddfc6b30258f2a3ca06a997af0d1ea2a7e9ee373e45df6280d18d57
                                            • Opcode Fuzzy Hash: 366c9f2ff7d3071940411c1c3336a022ee210cf9cdc94cb121acc5f9c0721f16
                                            • Instruction Fuzzy Hash: 0AF1BE34F106598FDB64DBA4C881B7EB7B2BF84304F248429D5069B7A6DB34ED42CB91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2487 142c996-142c99d 2488 142c9d8-142c9f7 2487->2488 2489 142c99f-142c9d2 2487->2489 2490 142ca4b-142ca97 LoadLibraryA 2488->2490 2491 142c9f9-142ca1e 2488->2491 2489->2488 2495 142caa0-142cad1 2490->2495 2496 142ca99-142ca9f 2490->2496 2491->2490 2494 142ca20-142ca22 2491->2494 2497 142ca24-142ca2e 2494->2497 2498 142ca45-142ca48 2494->2498 2503 142cad3-142cad7 2495->2503 2504 142cae1 2495->2504 2496->2495 2500 142ca32-142ca41 2497->2500 2501 142ca30 2497->2501 2498->2490 2500->2500 2505 142ca43 2500->2505 2501->2500 2503->2504 2506 142cad9 2503->2506 2507 142cae2 2504->2507 2505->2498 2506->2504 2507->2507
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 0142CA87
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836333035.0000000001420000.00000040.00000001.sdmp, Offset: 01420000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1420000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 9ad9c67dc392fc3b7ca9b94c428a62f2d84e984c8854222487dbd9165b691e9c
                                            • Instruction ID: d6e14ee4d6f7283cf6cb08c4335d172f013d796189213ebc76863cff20dcd4ca
                                            • Opcode Fuzzy Hash: 9ad9c67dc392fc3b7ca9b94c428a62f2d84e984c8854222487dbd9165b691e9c
                                            • Instruction Fuzzy Hash: F24145B1E006688FDB24CFA8C88579EBBF1FB48314F14812AD815EB795D7749886CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2508 142928c-142c9f7 2510 142ca4b-142ca97 LoadLibraryA 2508->2510 2511 142c9f9-142ca1e 2508->2511 2515 142caa0-142cad1 2510->2515 2516 142ca99-142ca9f 2510->2516 2511->2510 2514 142ca20-142ca22 2511->2514 2517 142ca24-142ca2e 2514->2517 2518 142ca45-142ca48 2514->2518 2523 142cad3-142cad7 2515->2523 2524 142cae1 2515->2524 2516->2515 2520 142ca32-142ca41 2517->2520 2521 142ca30 2517->2521 2518->2510 2520->2520 2525 142ca43 2520->2525 2521->2520 2523->2524 2526 142cad9 2523->2526 2527 142cae2 2524->2527 2525->2518 2526->2524 2527->2527
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 0142CA87
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836333035.0000000001420000.00000040.00000001.sdmp, Offset: 01420000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1420000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 29262be9ad7034616340f46c27efe2b3c53ce5366d2cd01dc1685b769529b3a7
                                            • Instruction ID: 29c2abb8106fc737877547c8aab1542bfd2737b149f038c4607a601496ea3387
                                            • Opcode Fuzzy Hash: 29262be9ad7034616340f46c27efe2b3c53ce5366d2cd01dc1685b769529b3a7
                                            • Instruction Fuzzy Hash: DE417AB1E006288FDB24CFA9C88479EBBF1FB48304F14812AD815E7395D7749886CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2545 1422f24-1422ff1 CreateActCtxA 2547 1422ff3-1422ff9 2545->2547 2548 1422ffa-1423054 2545->2548 2547->2548 2555 1423063-1423067 2548->2555 2556 1423056-1423059 2548->2556 2557 1423078 2555->2557 2558 1423069-1423075 2555->2558 2556->2555 2560 1423079 2557->2560 2558->2557 2560->2560
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01422FE1
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836333035.0000000001420000.00000040.00000001.sdmp, Offset: 01420000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1420000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 5114d53079b689abebb1420dc7bb85dbd3855061bc89ae183ba1ac436ab783c7
                                            • Instruction ID: 8507d1fc2de6e5c8881dc26aa6024497974c96be51a2123ee573940f36a947c0
                                            • Opcode Fuzzy Hash: 5114d53079b689abebb1420dc7bb85dbd3855061bc89ae183ba1ac436ab783c7
                                            • Instruction Fuzzy Hash: 1E41F4B1C0465CCFDB24CFA9C884BDEBBB1BF49304F24805AD409AB265DB75594ACF50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2528 1421a88-1422ff1 CreateActCtxA 2531 1422ff3-1422ff9 2528->2531 2532 1422ffa-1423054 2528->2532 2531->2532 2539 1423063-1423067 2532->2539 2540 1423056-1423059 2532->2540 2541 1423078 2539->2541 2542 1423069-1423075 2539->2542 2540->2539 2544 1423079 2541->2544 2542->2541 2544->2544
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 01422FE1
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836333035.0000000001420000.00000040.00000001.sdmp, Offset: 01420000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_1420000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 5d2aa580918f13327cbf84717e2ec5c0a9d81a7ccbcbcbf907f72d0f914f57d1
                                            • Instruction ID: e31e08dfa8cd80b11c86c23fec0c37f77d7c17bf46afcb2771d18e20a146aacb
                                            • Opcode Fuzzy Hash: 5d2aa580918f13327cbf84717e2ec5c0a9d81a7ccbcbcbf907f72d0f914f57d1
                                            • Instruction Fuzzy Hash: 0141F3B1C0462CCBDB24CFA9C844BDEBBB1BF49304F60805AD509AB265DB756949CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3182 6730001-6730012 3183 6730014 3182->3183 3184 673001a 3182->3184 3183->3184 3185 6730022-6730036 3184->3185 3186 673001b-673001d 3184->3186 3189 6730038-673003c 3185->3189 3190 673003e-6730068 3185->3190 3187 673007b 3186->3187 3188 673001f 3186->3188 3191 6730089-67300bb 3187->3191 3188->3185 3189->3190 3192 673006f-6730071 3190->3192 3197 67300be-67300c2 3191->3197 3192->3191 3193 6730073-6730079 3192->3193 3193->3187 3194 673007d-673007f 3193->3194 3194->3191 3198 67300c4-67300c9 3197->3198 3199 67300cb-67300d0 3197->3199 3200 67300d6-67300d9 3198->3200 3199->3200 3201 67300df-67300f3 3200->3201 3202 6730d8d-6730d97 3200->3202 3201->3197 3204 67300f5 3201->3204 3205 6730397-67303a6 3204->3205 3206 6730476-6730485 3204->3206 3207 67301d9-67301e8 3204->3207 3208 67302b8-67302c7 3204->3208 3209 67300fc-6730109 3204->3209 3210 6730d17-6730d3a 3205->3210 3214 67303ac-67303d2 3205->3214 3206->3210 3213 673048b-67304b1 3206->3213 3207->3210 3211 67301ee-6730214 3207->3211 3208->3210 3215 67302cd-67302f3 3208->3215 3209->3210 3212 673010f-6730135 3209->3212 3228 6730d40-6730d47 3210->3228 3229 6730f08-6730f0e 3210->3229 3243 6730216-673021b 3211->3243 3244 673021d-6730224 3211->3244 3245 6730137-673013c 3212->3245 3246 673013e-6730145 3212->3246 3236 67304b3-67304b8 3213->3236 3237 67304ba-67304c1 3213->3237 3238 67303d4-67303d9 3214->3238 3239 67303db-67303e2 3214->3239 3240 67302f5-67302fa 3215->3240 3241 67302fc-6730303 3215->3241 3228->3229 3235 6730d4d-6730d68 3228->3235 3235->3229 3263 6730d6e-6730d76 3235->3263 3247 6730523-6730550 3236->3247 3248 67304c3-67304e3 3237->3248 3249 67304e5-6730508 3237->3249 3250 6730444-6730471 3238->3250 3251 6730406-6730429 3239->3251 3252 67303e4-6730404 3239->3252 3253 6730365-6730392 3240->3253 3254 6730327-673034a 3241->3254 3255 6730305-6730325 3241->3255 3256 6730286-67302b3 3243->3256 3257 6730226-6730246 3244->3257 3258 6730248-673026b 3244->3258 3259 67301a7-67301d4 3245->3259 3260 6730147-6730167 3246->3260 3261 6730169-673018c 3246->3261 3247->3197 3248->3247 3295 6730520 3249->3295 3296 673050a-6730510 3249->3296 3250->3197 3297 6730441 3251->3297 3298 673042b-6730431 3251->3298 3252->3250 3253->3197 3299 6730362 3254->3299 3300 673034c-6730352 3254->3300 3255->3253 3256->3197 3257->3256 3301 6730283 3258->3301 3302 673026d-6730273 3258->3302 3259->3197 3260->3259 3303 67301a4 3261->3303 3304 673018e-6730194 3261->3304 3263->3229 3264 6730d7c-6730d85 3263->3264 3264->3202 3295->3247 3305 6730512 3296->3305 3306 6730514-6730516 3296->3306 3297->3250 3307 6730433 3298->3307 3308 6730435-6730437 3298->3308 3299->3253 3309 6730356-6730358 3300->3309 3310 6730354 3300->3310 3301->3256 3311 6730277-6730279 3302->3311 3312 6730275 3302->3312 3303->3259 3313 6730196 3304->3313 3314 6730198-673019a 3304->3314 3305->3295 3306->3295 3307->3297 3308->3297 3309->3299 3310->3299 3311->3301 3312->3301 3313->3303 3314->3303
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ?
                                            • API String ID: 0-1684325040
                                            • Opcode ID: ac5230b691750852d86ae323a2e8c5923bbbcfb3256077604577e0694e51ee2e
                                            • Instruction ID: b80b352bcb0fd888f279c6059d0992ead5061b8fccee67db751d1f48f0bff3cd
                                            • Opcode Fuzzy Hash: ac5230b691750852d86ae323a2e8c5923bbbcfb3256077604577e0694e51ee2e
                                            • Instruction Fuzzy Hash: AD911470F107558FEB688B64C891BAE7BB6AF85308F288469D101DF3A6DEB5DC01C791
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aefc97faf0dfe25c5c764dd7b38b85add94e41e9391cb5bf447569b703c37229
                                            • Instruction ID: 3e42c77948c00fed359a07ec993ee30ff10f2d88824546d00032fd8c1d7ccad2
                                            • Opcode Fuzzy Hash: aefc97faf0dfe25c5c764dd7b38b85add94e41e9391cb5bf447569b703c37229
                                            • Instruction Fuzzy Hash: 2B21F43134414A8F9B59CB38C4A4E7C7BE2EF8921439540A8E54ACB366DF34EC56C798
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7117ecfc49d0f94a3a6f70d60a5e432d9612a174a0ca43299dd08947ba5c81fd
                                            • Instruction ID: 8a6a8c5291361b94f12dc47dab9a1f2513cd9a8289e846bf24abe4e213064c80
                                            • Opcode Fuzzy Hash: 7117ecfc49d0f94a3a6f70d60a5e432d9612a174a0ca43299dd08947ba5c81fd
                                            • Instruction Fuzzy Hash: 5221A07A305B519FC7069B20D87442DBBB7FB8D2003046546D856C374BDB38AE62CBEA
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836089658.000000000136D000.00000040.00000001.sdmp, Offset: 0136D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_136d000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 13f5b56cbc29f4a5e3c15cc1bc1ee4866e3ffca633d29d5ccd08a0ebf3a0bc42
                                            • Instruction ID: 13caae1df8b10e245efafbb73fdbfc08f991e5ff58344397ccf94cfd0d2e626c
                                            • Opcode Fuzzy Hash: 13f5b56cbc29f4a5e3c15cc1bc1ee4866e3ffca633d29d5ccd08a0ebf3a0bc42
                                            • Instruction Fuzzy Hash: E221F371604244DFDB01CF94D8C0B16BF65FB8832CF24C5A9EA490F65AC336D916CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836123302.000000000137D000.00000040.00000001.sdmp, Offset: 0137D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_137d000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fadf91961b3e9a6eba7ae3dbefccf41d0eeef62103c6cbeb5e286a17809e2246
                                            • Instruction ID: 58ec1bc1097ebed53d5a2ffc785b1f7511353b65c52ed869be22ffa5b5ba9d13
                                            • Opcode Fuzzy Hash: fadf91961b3e9a6eba7ae3dbefccf41d0eeef62103c6cbeb5e286a17809e2246
                                            • Instruction Fuzzy Hash: 0C11E1B5504244DFDB11CF94E9C0B26BBA1FF84328F24C6ADE8094E746C33AD806CA61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9318fb92741e20717f97381990d78ce002ecb7c4848a7264d96330f33e528849
                                            • Instruction ID: 8b6aa33108e07e6d67ae97275a1c06fa9b430fe0f1f2dffcfcf01b079d1d668f
                                            • Opcode Fuzzy Hash: 9318fb92741e20717f97381990d78ce002ecb7c4848a7264d96330f33e528849
                                            • Instruction Fuzzy Hash: 0711B179300A15DB87059B11D47842EB7B7FBCC615310A614DD1AC374ADB34BEA38AE9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836089658.000000000136D000.00000040.00000001.sdmp, Offset: 0136D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_136d000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 42d9e2d5638be81c4c55ae2ffa6c37ec15d81233bed137c28215548ac88b7147
                                            • Instruction ID: 0830f400e0dde32bd844d3a9fa2606eb668dd11e306d506d6027573f3f549fdf
                                            • Opcode Fuzzy Hash: 42d9e2d5638be81c4c55ae2ffa6c37ec15d81233bed137c28215548ac88b7147
                                            • Instruction Fuzzy Hash: 60119E75504244DFCF06CF54D5C0B66BF62FB88328F28C6A9D94A0F61AC336D556CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.836123302.000000000137D000.00000040.00000001.sdmp, Offset: 0137D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_137d000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c5f53d78366b38dee22a24772efceccba442e808d3846d610b6ac72b4e025d3
                                            • Instruction ID: 84c6218c34fe469c5a0de3eb1db62f6d396a44b13c35a84da6e2bc870d2672fd
                                            • Opcode Fuzzy Hash: 7c5f53d78366b38dee22a24772efceccba442e808d3846d610b6ac72b4e025d3
                                            • Instruction Fuzzy Hash: 8F11AC75504244DFCB12CF54E584B16BBA2FF84328F24C6A9D80A4F75AC33AD446CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843309706.0000000006730000.00000040.00000001.sdmp, Offset: 06730000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_6730000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3c93742f2c85d0d59674fd029cd73824c9f727295936ead63ac77e136fe4c501
                                            • Instruction ID: 41628564306faf007849f29b19a666a3d076eea3e262958acc0ce17aedac8431
                                            • Opcode Fuzzy Hash: 3c93742f2c85d0d59674fd029cd73824c9f727295936ead63ac77e136fe4c501
                                            • Instruction Fuzzy Hash: A7D0A736B011199EEB40D648E4408DCF365EB94210F608077D204D7004CF305E5A8B93
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 066C08D8
                                            • GetCurrentThread.KERNEL32 ref: 066C0915
                                            • GetCurrentProcess.KERNEL32 ref: 066C0952
                                            • GetCurrentThreadId.KERNEL32 ref: 066C09AB
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843260897.00000000066C0000.00000040.00000001.sdmp, Offset: 066C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_66c0000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: e55f0feffcd4147e30930785384bc6d1a85c1f61217f54cfd86599a5f0ef3275
                                            • Instruction ID: 7b7591b1d4b0653d2908056380d9f2058ef2481875512759a886f398950e3a40
                                            • Opcode Fuzzy Hash: e55f0feffcd4147e30930785384bc6d1a85c1f61217f54cfd86599a5f0ef3275
                                            • Instruction Fuzzy Hash: 125174B0D00A498FDB54DFAAD989BAEBBF0EB48314F20845EE019A7351CB355985CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 066C08D8
                                            • GetCurrentThread.KERNEL32 ref: 066C0915
                                            • GetCurrentProcess.KERNEL32 ref: 066C0952
                                            • GetCurrentThreadId.KERNEL32 ref: 066C09AB
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.843260897.00000000066C0000.00000040.00000001.sdmp, Offset: 066C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_66c0000_CDC GUIDES COVID-19 Second Outbreak Warning release.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: eb38b6cdbff6b9d937947f47a8c301a3322a7b6943a62ebc8d12d0b1aa3ff7ff
                                            • Instruction ID: 85949a6e68bfd439a762a055a75a9f5f626540bd903b043a3ef57254ed495696
                                            • Opcode Fuzzy Hash: eb38b6cdbff6b9d937947f47a8c301a3322a7b6943a62ebc8d12d0b1aa3ff7ff
                                            • Instruction Fuzzy Hash: DF5153B0D00B498FDB54DFAAD949BAEBBF0EB48314F20845EE019A7351DB355984CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:8.8%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:100
                                            Total number of Limit Nodes:0

                                            Graph

                                            execution_graph 19222 d0b7a0 19223 d0b7be 19222->19223 19226 d09bb8 19223->19226 19225 d0b7f5 19228 d0d2c0 LoadLibraryA 19226->19228 19229 d0d3b9 19228->19229 19230 4e2dc52 19238 4e2cb20 19230->19238 19242 4e2cb18 19230->19242 19231 4e2d430 19232 4e2d2a7 19232->19231 19236 4e2ca30 WriteProcessMemory 19232->19236 19237 4e2ca2a WriteProcessMemory 19232->19237 19233 4e2d8ea 19236->19233 19237->19233 19239 4e2cb6b ReadProcessMemory 19238->19239 19241 4e2cbaf 19239->19241 19241->19232 19243 4e2cb21 ReadProcessMemory 19242->19243 19245 4e2cbaf 19243->19245 19245->19232 19136 4e2d260 19144 4e2cd58 19136->19144 19148 4e2cd4c 19136->19148 19137 4e2d430 19138 4e2d28e 19138->19137 19140 4e2ca30 WriteProcessMemory 19138->19140 19141 4e2ca2a WriteProcessMemory 19138->19141 19139 4e2d8ea 19140->19139 19141->19139 19145 4e2cde1 19144->19145 19145->19145 19146 4e2cf46 CreateProcessA 19145->19146 19147 4e2cfa3 19146->19147 19149 4e2cd51 19148->19149 19149->19149 19150 4e2cf46 CreateProcessA 19149->19150 19151 4e2cfa3 19150->19151 19246 4e2ddd1 19252 4e2ca30 WriteProcessMemory 19246->19252 19253 4e2ca2a WriteProcessMemory 19246->19253 19247 4e2d2a7 19248 4e2d430 19247->19248 19250 4e2ca30 WriteProcessMemory 19247->19250 19251 4e2ca2a WriteProcessMemory 19247->19251 19249 4e2d8ea 19250->19249 19251->19249 19252->19247 19253->19247 19152 4e2ed69 19156 4e2c892 19152->19156 19160 4e2c898 19152->19160 19153 4e2ed7c 19157 4e2c898 SetThreadContext 19156->19157 19159 4e2c925 19157->19159 19159->19153 19161 4e2c8dd SetThreadContext 19160->19161 19163 4e2c925 19161->19163 19163->19153 19254 4e2e5d9 19258 4e2e610 19254->19258 19262 4e2e604 19254->19262 19255 4e2e5f9 19260 4e2e669 GetUserNameA 19258->19260 19261 4e2e76e 19260->19261 19265 4e2e60f GetUserNameA 19262->19265 19264 4e2e76e 19265->19264 19164 4e2d87f 19172 4e2ca30 19164->19172 19176 4e2ca2a 19164->19176 19165 4e2d430 19166 4e2d2a7 19166->19165 19168 4e2ca30 WriteProcessMemory 19166->19168 19169 4e2ca2a WriteProcessMemory 19166->19169 19167 4e2d8ea 19168->19167 19169->19167 19173 4e2ca78 WriteProcessMemory 19172->19173 19175 4e2cacf 19173->19175 19175->19166 19177 4e2ca30 WriteProcessMemory 19176->19177 19179 4e2cacf 19177->19179 19179->19166 19180 4e2d97c 19181 4e2d23e 19180->19181 19181->19180 19183 4e2d2a7 19181->19183 19189 d0d590 19181->19189 19193 d0d589 19181->19193 19182 4e2d430 19183->19182 19187 4e2ca30 WriteProcessMemory 19183->19187 19188 4e2ca2a WriteProcessMemory 19183->19188 19184 4e2d8ea 19187->19184 19188->19184 19190 d0d5d0 ResumeThread 19189->19190 19192 d0d601 19190->19192 19192->19181 19194 d0d58c ResumeThread 19193->19194 19196 d0d601 19194->19196 19196->19181 19197 4e2d63c 19205 4e2e580 19197->19205 19209 4e2e550 19197->19209 19198 4e2d430 19199 4e2d8ea 19200 4e2d2a7 19200->19198 19203 4e2ca30 WriteProcessMemory 19200->19203 19204 4e2ca2a WriteProcessMemory 19200->19204 19203->19199 19204->19199 19214 4e2c970 19205->19214 19218 4e2c96a 19205->19218 19206 4e2e597 19206->19200 19210 4e2e563 19209->19210 19212 4e2c970 VirtualAllocEx 19210->19212 19213 4e2c96a VirtualAllocEx 19210->19213 19211 4e2e597 19211->19200 19212->19211 19213->19211 19215 4e2c9b0 VirtualAllocEx 19214->19215 19217 4e2c9ed 19215->19217 19217->19206 19219 4e2c970 VirtualAllocEx 19218->19219 19221 4e2c9ed 19219->19221 19221->19206

                                            Executed Functions

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 4e2cd4c-4e2cded 3 4e2ce26-4e2ce46 0->3 4 4e2cdef-4e2cdf9 0->4 11 4e2ce48-4e2ce52 3->11 12 4e2ce7f-4e2ceae 3->12 4->3 5 4e2cdfb-4e2cdfd 4->5 6 4e2ce20-4e2ce23 5->6 7 4e2cdff-4e2ce09 5->7 6->3 9 4e2ce0b 7->9 10 4e2ce0d-4e2ce1c 7->10 9->10 10->10 13 4e2ce1e 10->13 11->12 14 4e2ce54-4e2ce56 11->14 18 4e2ceb0-4e2ceba 12->18 19 4e2cee7-4e2cfa1 CreateProcessA 12->19 13->6 16 4e2ce58-4e2ce62 14->16 17 4e2ce79-4e2ce7c 14->17 20 4e2ce66-4e2ce75 16->20 21 4e2ce64 16->21 17->12 18->19 22 4e2cebc-4e2cebe 18->22 32 4e2cfa3-4e2cfa9 19->32 33 4e2cfaa-4e2d030 19->33 20->20 23 4e2ce77 20->23 21->20 24 4e2cec0-4e2ceca 22->24 25 4e2cee1-4e2cee4 22->25 23->17 27 4e2cece-4e2cedd 24->27 28 4e2cecc 24->28 25->19 27->27 29 4e2cedf 27->29 28->27 29->25 32->33 43 4e2d032-4e2d036 33->43 44 4e2d040-4e2d044 33->44 43->44 45 4e2d038 43->45 46 4e2d046-4e2d04a 44->46 47 4e2d054-4e2d058 44->47 45->44 46->47 48 4e2d04c 46->48 49 4e2d05a-4e2d05e 47->49 50 4e2d068-4e2d06c 47->50 48->47 49->50 53 4e2d060 49->53 51 4e2d07e-4e2d085 50->51 52 4e2d06e-4e2d074 50->52 54 4e2d087-4e2d096 51->54 55 4e2d09c 51->55 52->51 53->50 54->55 57 4e2d09d 55->57 57->57
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04E2CF8E
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: fd04b9719a5f249912d7e9ae33f0e74343e2f17f9641046b18395e3d962364b4
                                            • Instruction ID: 3a0346c169080dc9c5ae3a09729c666c87c13e6a6e54d990210fe959411aabf4
                                            • Opcode Fuzzy Hash: fd04b9719a5f249912d7e9ae33f0e74343e2f17f9641046b18395e3d962364b4
                                            • Instruction Fuzzy Hash: 7C915D71D00229DFDF10DF68C981BEDBBB2BF48318F248569E909A7290DB749985CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 58 4e2cd58-4e2cded 60 4e2ce26-4e2ce46 58->60 61 4e2cdef-4e2cdf9 58->61 68 4e2ce48-4e2ce52 60->68 69 4e2ce7f-4e2ceae 60->69 61->60 62 4e2cdfb-4e2cdfd 61->62 63 4e2ce20-4e2ce23 62->63 64 4e2cdff-4e2ce09 62->64 63->60 66 4e2ce0b 64->66 67 4e2ce0d-4e2ce1c 64->67 66->67 67->67 70 4e2ce1e 67->70 68->69 71 4e2ce54-4e2ce56 68->71 75 4e2ceb0-4e2ceba 69->75 76 4e2cee7-4e2cfa1 CreateProcessA 69->76 70->63 73 4e2ce58-4e2ce62 71->73 74 4e2ce79-4e2ce7c 71->74 77 4e2ce66-4e2ce75 73->77 78 4e2ce64 73->78 74->69 75->76 79 4e2cebc-4e2cebe 75->79 89 4e2cfa3-4e2cfa9 76->89 90 4e2cfaa-4e2d030 76->90 77->77 80 4e2ce77 77->80 78->77 81 4e2cec0-4e2ceca 79->81 82 4e2cee1-4e2cee4 79->82 80->74 84 4e2cece-4e2cedd 81->84 85 4e2cecc 81->85 82->76 84->84 86 4e2cedf 84->86 85->84 86->82 89->90 100 4e2d032-4e2d036 90->100 101 4e2d040-4e2d044 90->101 100->101 102 4e2d038 100->102 103 4e2d046-4e2d04a 101->103 104 4e2d054-4e2d058 101->104 102->101 103->104 105 4e2d04c 103->105 106 4e2d05a-4e2d05e 104->106 107 4e2d068-4e2d06c 104->107 105->104 106->107 110 4e2d060 106->110 108 4e2d07e-4e2d085 107->108 109 4e2d06e-4e2d074 107->109 111 4e2d087-4e2d096 108->111 112 4e2d09c 108->112 109->108 110->107 111->112 114 4e2d09d 112->114 114->114
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04E2CF8E
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 333a4b0d89f9448c3e49a0ded158addefb3f63589c20de08bc51ea75177ee154
                                            • Instruction ID: 217dbd88bf5b2bd0afb3ef23b1b425e8d77a0844a46db4fc967acecce2daa6be
                                            • Opcode Fuzzy Hash: 333a4b0d89f9448c3e49a0ded158addefb3f63589c20de08bc51ea75177ee154
                                            • Instruction Fuzzy Hash: 92915C71D00229DFDB10DF68C941BEDBBB2BF48318F248569E809A7290DB74A985CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 115 4e2e604-4e2e60d 116 4e2e657-4e2e677 115->116 117 4e2e60f-4e2e655 115->117 119 4e2e6e6-4e2e6ea 116->119 120 4e2e679-4e2e69e 116->120 117->116 121 4e2e72e-4e2e76c GetUserNameA 119->121 122 4e2e6ec-4e2e72a 119->122 126 4e2e6a0-4e2e6a2 120->126 127 4e2e6ce-4e2e6d3 120->127 123 4e2e775-4e2e792 121->123 124 4e2e76e-4e2e774 121->124 122->121 136 4e2e794-4e2e7a0 123->136 137 4e2e7a8-4e2e7cf 123->137 124->123 129 4e2e6c4-4e2e6cc 126->129 130 4e2e6a4-4e2e6ae 126->130 135 4e2e6d5-4e2e6e1 127->135 129->135 133 4e2e6b2-4e2e6c0 130->133 134 4e2e6b0 130->134 133->133 140 4e2e6c2 133->140 134->133 135->119 136->137 143 4e2e7d1-4e2e7d5 137->143 144 4e2e7df 137->144 140->129 143->144 146 4e2e7d7 143->146 148 4e2e7e0 144->148 146->144 148->148
                                            APIs
                                            • GetUserNameA.ADVAPI32(00000000), ref: 04E2E75C
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: 70d634b439773351939878edc52b985928c03a2d942093927a8eb2624cc7afd7
                                            • Instruction ID: 4d0585bfbb9faaf05e877d666091de2151053da942202727195e7c355a59970f
                                            • Opcode Fuzzy Hash: 70d634b439773351939878edc52b985928c03a2d942093927a8eb2624cc7afd7
                                            • Instruction Fuzzy Hash: 0C514A70D002288FDB14CFA9C995BDDBBF1AF48308F248429E816BB391D774A945CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 149 4e2e610-4e2e677 151 4e2e6e6-4e2e6ea 149->151 152 4e2e679-4e2e69e 149->152 153 4e2e72e-4e2e76c GetUserNameA 151->153 154 4e2e6ec-4e2e72a 151->154 158 4e2e6a0-4e2e6a2 152->158 159 4e2e6ce-4e2e6d3 152->159 155 4e2e775-4e2e792 153->155 156 4e2e76e-4e2e774 153->156 154->153 168 4e2e794-4e2e7a0 155->168 169 4e2e7a8-4e2e7cf 155->169 156->155 161 4e2e6c4-4e2e6cc 158->161 162 4e2e6a4-4e2e6ae 158->162 167 4e2e6d5-4e2e6e1 159->167 161->167 165 4e2e6b2-4e2e6c0 162->165 166 4e2e6b0 162->166 165->165 172 4e2e6c2 165->172 166->165 167->151 168->169 175 4e2e7d1-4e2e7d5 169->175 176 4e2e7df 169->176 172->161 175->176 178 4e2e7d7 175->178 180 4e2e7e0 176->180 178->176 180->180
                                            APIs
                                            • GetUserNameA.ADVAPI32(00000000), ref: 04E2E75C
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: 5ede044c31727d3a85ca2b10a3eb928f94d24b6461ae36b44103dc83dac081c1
                                            • Instruction ID: bf5b6d4d9d005d8eec4004c45bc9aaaa67d7fa7b72ad3aaacf51c263e72269e9
                                            • Opcode Fuzzy Hash: 5ede044c31727d3a85ca2b10a3eb928f94d24b6461ae36b44103dc83dac081c1
                                            • Instruction Fuzzy Hash: 09512A70D002288FDB14CFA9C595BDEBBF5AF48314F24842DD815AB391DB74A945CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 181 d0d2b4-d0d317 183 d0d319-d0d33e 181->183 184 d0d36b-d0d3b7 LoadLibraryA 181->184 183->184 189 d0d340-d0d342 183->189 187 d0d3c0-d0d3f1 184->187 188 d0d3b9-d0d3bf 184->188 194 d0d401 187->194 195 d0d3f3-d0d3f7 187->195 188->187 191 d0d344-d0d34e 189->191 192 d0d365-d0d368 189->192 196 d0d350 191->196 197 d0d352-d0d361 191->197 192->184 200 d0d402 194->200 195->194 199 d0d3f9 195->199 196->197 197->197 198 d0d363 197->198 198->192 199->194 200->200
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 00D0D3A7
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.352617520.0000000000D00000.00000040.00000001.sdmp, Offset: 00D00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_d00000_vlc.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 768b46e50d7d9cd1a13d16dd3b55fc0ea620878f2421529403c2fc3862575a03
                                            • Instruction ID: 2ea6561c981917dbe9ec41dbdda67f0399bade7b4c23e3fae12c1bf8468c0e4e
                                            • Opcode Fuzzy Hash: 768b46e50d7d9cd1a13d16dd3b55fc0ea620878f2421529403c2fc3862575a03
                                            • Instruction Fuzzy Hash: 62413670D006588FDB10CFE9D88579EBBF2AB48314F14852AE819E7381D774A846CFA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 201 d09bb8-d0d317 203 d0d319-d0d33e 201->203 204 d0d36b-d0d3b7 LoadLibraryA 201->204 203->204 209 d0d340-d0d342 203->209 207 d0d3c0-d0d3f1 204->207 208 d0d3b9-d0d3bf 204->208 214 d0d401 207->214 215 d0d3f3-d0d3f7 207->215 208->207 211 d0d344-d0d34e 209->211 212 d0d365-d0d368 209->212 216 d0d350 211->216 217 d0d352-d0d361 211->217 212->204 220 d0d402 214->220 215->214 219 d0d3f9 215->219 216->217 217->217 218 d0d363 217->218 218->212 219->214 220->220
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 00D0D3A7
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.352617520.0000000000D00000.00000040.00000001.sdmp, Offset: 00D00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_d00000_vlc.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: cb13c2c6e869403621aad58c830f0137dcce02a2de64bef97c49b4c161af46a4
                                            • Instruction ID: 55a9899107ca347ef143085756a74486282b5c72d399f42bfe8e2dfc40daf58c
                                            • Opcode Fuzzy Hash: cb13c2c6e869403621aad58c830f0137dcce02a2de64bef97c49b4c161af46a4
                                            • Instruction Fuzzy Hash: 5E412771D106588FDB10CFE9D88579EBBF2AB48314F14812AE819EB385D774A845CFA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 840 4e2ca2a-4e2ca7e 843 4e2ca80-4e2ca8c 840->843 844 4e2ca8e-4e2cacd WriteProcessMemory 840->844 843->844 846 4e2cad6-4e2cb06 844->846 847 4e2cacf-4e2cad5 844->847 847->846
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04E2CAC0
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 84f31db40accedc4a770d6df10cadb0175022031f6b6f98d15af1110dd7ffe3f
                                            • Instruction ID: 63c53512bd1d93da532bda079483a07d489ec4e0d7d5f79e6787d2111f68e12c
                                            • Opcode Fuzzy Hash: 84f31db40accedc4a770d6df10cadb0175022031f6b6f98d15af1110dd7ffe3f
                                            • Instruction Fuzzy Hash: 70215AB19003599FCF10DFAAC9817DEBBF4FF48314F148429E959A7640DB78A944CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 851 4e2ca30-4e2ca7e 853 4e2ca80-4e2ca8c 851->853 854 4e2ca8e-4e2cacd WriteProcessMemory 851->854 853->854 856 4e2cad6-4e2cb06 854->856 857 4e2cacf-4e2cad5 854->857 857->856
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04E2CAC0
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: c8298d9828f7ae5cc5c44118d7b798621a15ed519bb01e2235d38b8c4526e934
                                            • Instruction ID: c2243b29bc02d347d193eddafb15b6bf72cf6dffd2e0eef3cd3859c4c2057257
                                            • Opcode Fuzzy Hash: c8298d9828f7ae5cc5c44118d7b798621a15ed519bb01e2235d38b8c4526e934
                                            • Instruction Fuzzy Hash: E42139B19003599FCF10CFAAC9857DEBBF5FF48314F148429E959A7241DB78A944CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 861 4e2c892-4e2c8e3 864 4e2c8f3-4e2c923 SetThreadContext 861->864 865 4e2c8e5-4e2c8f1 861->865 867 4e2c925-4e2c92b 864->867 868 4e2c92c-4e2c95c 864->868 865->864 867->868
                                            APIs
                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 04E2C916
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: ContextThread
                                            • String ID:
                                            • API String ID: 1591575202-0
                                            • Opcode ID: 1dbc2f47985fd740e0729c703e504d758b90532c74de27a1e1c8e7fb7dd9178d
                                            • Instruction ID: 4f8798ef18ba8fd6cba13d71567198fe291c7e5279e982ba03af937c60656084
                                            • Opcode Fuzzy Hash: 1dbc2f47985fd740e0729c703e504d758b90532c74de27a1e1c8e7fb7dd9178d
                                            • Instruction Fuzzy Hash: BC2157719003188FDB10DFAAC8857EEBBF4EF48224F54842AD519A7641CB78A945CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 872 4e2cb18-4e2cbad ReadProcessMemory 876 4e2cbb6-4e2cbe6 872->876 877 4e2cbaf-4e2cbb5 872->877 877->876
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04E2CBA0
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 92c45063e52cb1e45a5554ed9ed95a9ce91ac09294a672ab4c72be65e3bdacad
                                            • Instruction ID: b04ffc51b9fe23c9480b473b2ecdb13baec46ad38b6758493deb769ebc5818a0
                                            • Opcode Fuzzy Hash: 92c45063e52cb1e45a5554ed9ed95a9ce91ac09294a672ab4c72be65e3bdacad
                                            • Instruction Fuzzy Hash: 1D212771C003499FCB10DFAAC9846DEBBB5FF48314F14842AE959A7241C7789944CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 881 4e2c898-4e2c8e3 883 4e2c8f3-4e2c923 SetThreadContext 881->883 884 4e2c8e5-4e2c8f1 881->884 886 4e2c925-4e2c92b 883->886 887 4e2c92c-4e2c95c 883->887 884->883 886->887
                                            APIs
                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 04E2C916
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: ContextThread
                                            • String ID:
                                            • API String ID: 1591575202-0
                                            • Opcode ID: b816e6de7efa6f7718641b8e1a7b88b2dc4e0d86a03c3aedf62ed3072291b543
                                            • Instruction ID: c568112e0cb68b54f22f5c8b6516e2df7321f890b87001ed0d4d592799fc77bb
                                            • Opcode Fuzzy Hash: b816e6de7efa6f7718641b8e1a7b88b2dc4e0d86a03c3aedf62ed3072291b543
                                            • Instruction Fuzzy Hash: AD216571D003088FDB10DFAAC8857EEBBF4EF48324F24842AD519A7241CB78A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 891 4e2cb20-4e2cbad ReadProcessMemory 894 4e2cbb6-4e2cbe6 891->894 895 4e2cbaf-4e2cbb5 891->895 895->894
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04E2CBA0
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 69c113867166c56d8913f13f807ac488bb5f04842825237ca467d5b8741a193f
                                            • Instruction ID: c704511c4c8c5ebf7947fe953402d9f00751342545294cd23916a5bda2872f10
                                            • Opcode Fuzzy Hash: 69c113867166c56d8913f13f807ac488bb5f04842825237ca467d5b8741a193f
                                            • Instruction Fuzzy Hash: 132116718003599FCB10DFAAC984AEEBBF5FF48314F10842AE919A7241CB789944CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 899 4e2c96a-4e2c9eb VirtualAllocEx 903 4e2c9f4-4e2ca19 899->903 904 4e2c9ed-4e2c9f3 899->904 904->903
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04E2C9DE
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 4aa85661dc6f175b3a1ddd5f06d74d2f4a733d22902e7e52bc8b480e5c62b3b5
                                            • Instruction ID: caff7da3eeeec42e01bf452c9de8e40154c1cec0cb97964d68832d84582f992f
                                            • Opcode Fuzzy Hash: 4aa85661dc6f175b3a1ddd5f06d74d2f4a733d22902e7e52bc8b480e5c62b3b5
                                            • Instruction Fuzzy Hash: B0116A728002489FCF10DFAAC8457EFBBF5EF48324F248819E515A7650CB79A944CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 908 4e2c970-4e2c9eb VirtualAllocEx 911 4e2c9f4-4e2ca19 908->911 912 4e2c9ed-4e2c9f3 908->912 912->911
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04E2C9DE
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.356782418.0000000004E20000.00000040.00000001.sdmp, Offset: 04E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_4e20000_vlc.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: fc5f2c63034bee5f39eea55f1c6cc02dd85f48e59fe8694de86dce3afd8362c4
                                            • Instruction ID: a4d0d5e2e04f7fc34e161e65a8d16551bd7e5b6f1f00872a0f50c15830769812
                                            • Opcode Fuzzy Hash: fc5f2c63034bee5f39eea55f1c6cc02dd85f48e59fe8694de86dce3afd8362c4
                                            • Instruction Fuzzy Hash: FF1137729002499FCF10DFAAD8457EFBBF5AF48324F248819E525A7250CB75A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 916 d0d589-d0d5ff ResumeThread 920 d0d601-d0d607 916->920 921 d0d608-d0d62d 916->921 920->921
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.352617520.0000000000D00000.00000040.00000001.sdmp, Offset: 00D00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_d00000_vlc.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: fe22604424ed049f42f7e57dcc1a6ba5847ed2ce70372901154a70c3184eccfc
                                            • Instruction ID: 3df023040428d6baeab647e7ad0f02922e27e69e7acff67d0d1c0c7c724237bf
                                            • Opcode Fuzzy Hash: fe22604424ed049f42f7e57dcc1a6ba5847ed2ce70372901154a70c3184eccfc
                                            • Instruction Fuzzy Hash: B01116B19042488FDB20DFAAD8447EFBBF5AB88324F24841AD519B7650CB789945CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.352617520.0000000000D00000.00000040.00000001.sdmp, Offset: 00D00000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_d00000_vlc.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: fe663a4be77f251a99b084811fdcd8acf5a1eb11224cb5796524c59ebbbcbec1
                                            • Instruction ID: 3ecebdb38889a5bec7db67f95130fc1e1bfa9bf2fda2d422d5e58bea06d003d6
                                            • Opcode Fuzzy Hash: fe663a4be77f251a99b084811fdcd8acf5a1eb11224cb5796524c59ebbbcbec1
                                            • Instruction Fuzzy Hash: A5113A719043488BCB10DFAAD8447DFFBF5AF88324F24841AD519A7740CB78A944CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions

                                            Execution Graph

                                            Execution Coverage:5.2%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:63
                                            Total number of Limit Nodes:2

                                            Graph

                                            execution_graph 8858 50ed87f 8862 50eca2b 8858->8862 8866 50eca30 8858->8866 8859 50ed2a7 8863 50eca30 WriteProcessMemory 8862->8863 8865 50ecacf 8863->8865 8865->8859 8867 50eca78 WriteProcessMemory 8866->8867 8869 50ecacf 8867->8869 8869->8859 8870 50ed63c 8874 50ee550 8870->8874 8880 50ee580 8870->8880 8871 50ed2a7 8875 50ee563 8874->8875 8877 50ee599 8875->8877 8886 50ec96b 8875->8886 8890 50ec970 8875->8890 8876 50ee597 8876->8871 8877->8871 8881 50ee581 8880->8881 8883 50ee599 8881->8883 8884 50ec96b VirtualAllocEx 8881->8884 8885 50ec970 VirtualAllocEx 8881->8885 8882 50ee597 8882->8871 8883->8871 8884->8882 8885->8882 8887 50ec970 VirtualAllocEx 8886->8887 8889 50ec9ed 8887->8889 8889->8876 8891 50ec9b0 VirtualAllocEx 8890->8891 8893 50ec9ed 8891->8893 8893->8876 8894 50ee5db 8895 50ee5e4 8894->8895 8899 50ee604 8895->8899 8903 50ee610 8895->8903 8896 50ee5f9 8902 50ee608 GetUserNameA 8899->8902 8901 50ee76e 8902->8901 8905 50ee611 GetUserNameA 8903->8905 8906 50ee76e 8905->8906 8907 50ec898 8908 50ec8dd SetThreadContext 8907->8908 8910 50ec925 8908->8910 8911 50ed5d4 8912 50ed5e3 8911->8912 8914 50ed2a7 8912->8914 8915 50eca2b WriteProcessMemory 8912->8915 8916 50eca30 WriteProcessMemory 8912->8916 8913 50ed8ea 8915->8913 8916->8913 8917 50edc52 8921 50ecb18 8917->8921 8925 50ecb20 8917->8925 8918 50ed2a7 8922 50ecb21 ReadProcessMemory 8921->8922 8924 50ecbaf 8922->8924 8924->8918 8926 50ecb6b ReadProcessMemory 8925->8926 8928 50ecbaf 8926->8928 8928->8918 8846 50ed260 8850 50ecd4c 8846->8850 8854 50ecd58 8846->8854 8851 50ecd51 CreateProcessA 8850->8851 8853 50ecfa3 8851->8853 8855 50ecd5d CreateProcessA 8854->8855 8857 50ecfa3 8855->8857 8929 50eddd1 8931 50eca2b WriteProcessMemory 8929->8931 8932 50eca30 WriteProcessMemory 8929->8932 8930 50ed2a7 8931->8930 8932->8930

                                            Executed Functions

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 50ecd4c-50ecd54 2 50ecd5d-50ecded 0->2 3 50ecd58-50ecd5c 0->3 5 50ecdef-50ecdf9 2->5 6 50ece26-50ece46 2->6 3->2 5->6 7 50ecdfb-50ecdfd 5->7 13 50ece7f-50eceae 6->13 14 50ece48-50ece52 6->14 9 50ecdff-50ece09 7->9 10 50ece20-50ece23 7->10 11 50ece0d-50ece1c 9->11 12 50ece0b 9->12 10->6 11->11 15 50ece1e 11->15 12->11 20 50ecee7-50ecfa1 CreateProcessA 13->20 21 50eceb0-50eceba 13->21 14->13 16 50ece54-50ece56 14->16 15->10 18 50ece58-50ece62 16->18 19 50ece79-50ece7c 16->19 22 50ece66-50ece75 18->22 23 50ece64 18->23 19->13 34 50ecfaa-50ed030 20->34 35 50ecfa3-50ecfa9 20->35 21->20 24 50ecebc-50ecebe 21->24 22->22 25 50ece77 22->25 23->22 26 50ecec0-50ececa 24->26 27 50ecee1-50ecee4 24->27 25->19 29 50ecece-50ecedd 26->29 30 50ececc 26->30 27->20 29->29 31 50ecedf 29->31 30->29 31->27 45 50ed032-50ed036 34->45 46 50ed040-50ed044 34->46 35->34 45->46 47 50ed038 45->47 48 50ed046-50ed04a 46->48 49 50ed054-50ed058 46->49 47->46 48->49 50 50ed04c 48->50 51 50ed05a-50ed05e 49->51 52 50ed068-50ed06c 49->52 50->49 51->52 53 50ed060 51->53 54 50ed07e-50ed085 52->54 55 50ed06e-50ed074 52->55 53->52 56 50ed09c 54->56 57 50ed087-50ed096 54->57 55->54 59 50ed09d 56->59 57->56 59->59
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 050ECF8E
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 56d3837ac243b3b682e8245e8022b6b5664412105a8ef94821180faa1fb9f7e6
                                            • Instruction ID: f1982d59985309ce7d47460b8e2f8192ec247b641b151916305ee17d966534b4
                                            • Opcode Fuzzy Hash: 56d3837ac243b3b682e8245e8022b6b5664412105a8ef94821180faa1fb9f7e6
                                            • Instruction Fuzzy Hash: BBA18871D04219CFEB20CF68D884BEDBBF2BF48304F248569E809A7280DB759985CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 60 50ecd58-50ecded 63 50ecdef-50ecdf9 60->63 64 50ece26-50ece46 60->64 63->64 65 50ecdfb-50ecdfd 63->65 71 50ece7f-50eceae 64->71 72 50ece48-50ece52 64->72 67 50ecdff-50ece09 65->67 68 50ece20-50ece23 65->68 69 50ece0d-50ece1c 67->69 70 50ece0b 67->70 68->64 69->69 73 50ece1e 69->73 70->69 78 50ecee7-50ecfa1 CreateProcessA 71->78 79 50eceb0-50eceba 71->79 72->71 74 50ece54-50ece56 72->74 73->68 76 50ece58-50ece62 74->76 77 50ece79-50ece7c 74->77 80 50ece66-50ece75 76->80 81 50ece64 76->81 77->71 92 50ecfaa-50ed030 78->92 93 50ecfa3-50ecfa9 78->93 79->78 82 50ecebc-50ecebe 79->82 80->80 83 50ece77 80->83 81->80 84 50ecec0-50ececa 82->84 85 50ecee1-50ecee4 82->85 83->77 87 50ecece-50ecedd 84->87 88 50ececc 84->88 85->78 87->87 89 50ecedf 87->89 88->87 89->85 103 50ed032-50ed036 92->103 104 50ed040-50ed044 92->104 93->92 103->104 105 50ed038 103->105 106 50ed046-50ed04a 104->106 107 50ed054-50ed058 104->107 105->104 106->107 108 50ed04c 106->108 109 50ed05a-50ed05e 107->109 110 50ed068-50ed06c 107->110 108->107 109->110 111 50ed060 109->111 112 50ed07e-50ed085 110->112 113 50ed06e-50ed074 110->113 111->110 114 50ed09c 112->114 115 50ed087-50ed096 112->115 113->112 117 50ed09d 114->117 115->114 117->117
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 050ECF8E
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 66b16ac4293f55d7b150c1c02a942e823f74dae3a809a7c53476c636af0342b0
                                            • Instruction ID: 1afea5c96e248ba8b4739ecb3dc57a222b432b1a2c4752a5ab8dd83bc755c791
                                            • Opcode Fuzzy Hash: 66b16ac4293f55d7b150c1c02a942e823f74dae3a809a7c53476c636af0342b0
                                            • Instruction Fuzzy Hash: EE917871D00219CFEB20CF68D884BEDBBF2FB48304F248569E809A7280DB759985CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 118 50ee604-50ee605 119 50ee60d 118->119 120 50ee608 118->120 123 50ee60f 119->123 124 50ee683-50ee69e 119->124 121 50ee60a 120->121 122 50ee648-50ee677 120->122 125 50ee611-50ee645 121->125 126 50ee60c 121->126 129 50ee679-50ee682 122->129 130 50ee6e6-50ee6ea 122->130 123->125 131 50ee6ce-50ee6d3 124->131 132 50ee6a0-50ee6a2 124->132 125->122 126->119 129->124 133 50ee72e-50ee76c GetUserNameA 130->133 134 50ee6ec-50ee72a 130->134 141 50ee6d5-50ee6e1 131->141 135 50ee6c4-50ee6cc 132->135 136 50ee6a4-50ee6ae 132->136 137 50ee76e-50ee774 133->137 138 50ee775-50ee792 133->138 134->133 135->141 139 50ee6b2-50ee6c0 136->139 140 50ee6b0 136->140 137->138 147 50ee7a8-50ee7cf 138->147 148 50ee794-50ee7a0 138->148 139->139 144 50ee6c2 139->144 140->139 141->130 144->135 152 50ee7df 147->152 153 50ee7d1-50ee7d5 147->153 148->147 156 50ee7e0 152->156 153->152 155 50ee7d7 153->155 155->152 156->156
                                            APIs
                                            • GetUserNameA.ADVAPI32(00000000), ref: 050EE75C
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: 706bc503fcda182995c24a9c5a2491333d91511e5089e304df8a9f28c9b88b17
                                            • Instruction ID: 85e889c518d55a2a0b7cb96bf481652210622e87c792aad124d0f10f649a934f
                                            • Opcode Fuzzy Hash: 706bc503fcda182995c24a9c5a2491333d91511e5089e304df8a9f28c9b88b17
                                            • Instruction Fuzzy Hash: F0517774D042088FDB14CFA9D994BEDBBF5BF49304F248029E816AB391DB749845CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 158 50ee610-50ee677 162 50ee679-50ee69e 158->162 163 50ee6e6-50ee6ea 158->163 171 50ee6ce-50ee6d3 162->171 172 50ee6a0-50ee6a2 162->172 164 50ee72e-50ee76c GetUserNameA 163->164 165 50ee6ec-50ee72a 163->165 167 50ee76e-50ee774 164->167 168 50ee775-50ee792 164->168 165->164 167->168 175 50ee7a8-50ee7cf 168->175 176 50ee794-50ee7a0 168->176 183 50ee6d5-50ee6e1 171->183 178 50ee6c4-50ee6cc 172->178 179 50ee6a4-50ee6ae 172->179 186 50ee7df 175->186 187 50ee7d1-50ee7d5 175->187 176->175 178->183 181 50ee6b2-50ee6c0 179->181 182 50ee6b0 179->182 181->181 189 50ee6c2 181->189 182->181 183->163 191 50ee7e0 186->191 187->186 190 50ee7d7 187->190 189->178 190->186 191->191
                                            APIs
                                            • GetUserNameA.ADVAPI32(00000000), ref: 050EE75C
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: e8896e27117211b4facf0ae3be0a9be20a2d5b692d6921338977077e3dd3931c
                                            • Instruction ID: 620e8e68abd7cdbdb25550e36dfc4a15dbdf9c3ccc52fd0dbd987b359b9367eb
                                            • Opcode Fuzzy Hash: e8896e27117211b4facf0ae3be0a9be20a2d5b692d6921338977077e3dd3931c
                                            • Instruction Fuzzy Hash: C4512770E042088FDB14CFA9D994BDEBBF5BF48304F248029D856AB391DB749945CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 193 50eca2b-50eca7e 196 50eca8e-50ecacd WriteProcessMemory 193->196 197 50eca80-50eca8c 193->197 199 50ecacf-50ecad5 196->199 200 50ecad6-50ecb06 196->200 197->196 199->200
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 050ECAC0
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: df725f274da31daeb1a8ad8497a7303fe7ddcd105f13df55d769a7a98962307e
                                            • Instruction ID: 1c388d38b863a66e942003c75d4539aa48b9589b9c94eb65a0f50736985c8e9e
                                            • Opcode Fuzzy Hash: df725f274da31daeb1a8ad8497a7303fe7ddcd105f13df55d769a7a98962307e
                                            • Instruction Fuzzy Hash: AE2126729003499FCB10CFAAD885BDEBBF5FF48314F14842AE919A7641DB789944CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 204 50eca30-50eca7e 206 50eca8e-50ecacd WriteProcessMemory 204->206 207 50eca80-50eca8c 204->207 209 50ecacf-50ecad5 206->209 210 50ecad6-50ecb06 206->210 207->206 209->210
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 050ECAC0
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 8ede358ec99e155955b7b4fb9808be042f1b3eeed0badfe759540be81acbeb2d
                                            • Instruction ID: 0d7c7a587b615408ff3187ca98717ef4f1bfce62dd3623a9387bc5fbfc2215d4
                                            • Opcode Fuzzy Hash: 8ede358ec99e155955b7b4fb9808be042f1b3eeed0badfe759540be81acbeb2d
                                            • Instruction Fuzzy Hash: 832126719003499FCB10CFAAD885BDEBBF5FF48314F14842AE919A7641DB789944CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 214 50ecb18-50ecbad ReadProcessMemory 218 50ecbaf-50ecbb5 214->218 219 50ecbb6-50ecbe6 214->219 218->219
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 050ECBA0
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 38c87d62ad1c90ffe2edc2ecb222c639ae52167d3e4b29103c02e6da949fe77d
                                            • Instruction ID: 2129e09e5c0c88111dfd7ed12b0a9570a0cbb9a5d04be56c0481262feb9012be
                                            • Opcode Fuzzy Hash: 38c87d62ad1c90ffe2edc2ecb222c639ae52167d3e4b29103c02e6da949fe77d
                                            • Instruction Fuzzy Hash: E2213671C007499FCB10DFAAC880AEEBBF5FF48314F14842EE959A7241CB789945CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 223 50ec893-50ec8e3 226 50ec8e5-50ec8f1 223->226 227 50ec8f3-50ec923 SetThreadContext 223->227 226->227 229 50ec92c-50ec95c 227->229 230 50ec925-50ec92b 227->230 230->229
                                            APIs
                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 050EC916
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: ContextThread
                                            • String ID:
                                            • API String ID: 1591575202-0
                                            • Opcode ID: 4a373a8252b4ffcdcd91454025e6c3f41215c427b25baa4e455fcc36d43be48d
                                            • Instruction ID: 66f690cf87bfbc75c4969d38edf7b1e2c30b8e565a524ab9c2bad814728a97a4
                                            • Opcode Fuzzy Hash: 4a373a8252b4ffcdcd91454025e6c3f41215c427b25baa4e455fcc36d43be48d
                                            • Instruction Fuzzy Hash: 27214371D043088FDB10DFAAC8857AEBBF4EB48224F14802AE519A7241CB78A944CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 234 50ec898-50ec8e3 236 50ec8e5-50ec8f1 234->236 237 50ec8f3-50ec923 SetThreadContext 234->237 236->237 239 50ec92c-50ec95c 237->239 240 50ec925-50ec92b 237->240 240->239
                                            APIs
                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 050EC916
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: ContextThread
                                            • String ID:
                                            • API String ID: 1591575202-0
                                            • Opcode ID: 92c9726319bdf23b0016e11078394e5c9d5ec2831846610dcd2d1500eeea5aa8
                                            • Instruction ID: 258a9fb0af17f68bf009221e89f0b8648d4f76acf97e46ec70709d6799e636ab
                                            • Opcode Fuzzy Hash: 92c9726319bdf23b0016e11078394e5c9d5ec2831846610dcd2d1500eeea5aa8
                                            • Instruction Fuzzy Hash: B1213471D043098FDB10DFAAC4857EEBBF4FF48224F14842AD559A7241CB78A945CBA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 244 50ecb20-50ecbad ReadProcessMemory 247 50ecbaf-50ecbb5 244->247 248 50ecbb6-50ecbe6 244->248 247->248
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 050ECBA0
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 894ad855ce5cc49c08c18b34d6f42db17864aaad91a5fbc8d3412fc6d73300a4
                                            • Instruction ID: 39f3ac6aa384c8e28212b65c256ec070eb759a5bf6235d2d63b919f528bbca82
                                            • Opcode Fuzzy Hash: 894ad855ce5cc49c08c18b34d6f42db17864aaad91a5fbc8d3412fc6d73300a4
                                            • Instruction Fuzzy Hash: EE212871C007499FCF10DFAAD880AEEBBF5FF48314F14842AE519A7241CB789944CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 252 50ec96b-50ec9eb VirtualAllocEx 256 50ec9ed-50ec9f3 252->256 257 50ec9f4-50eca19 252->257 256->257
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 050EC9DE
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 0a28b651b3b33649a6e9b81280ec953b5004416f205d2bc0fd476c4c80b0b195
                                            • Instruction ID: 61f3215a274ae6cf5b9331331e2609cb44f38b3ffa97cebad06fca8b7956bdea
                                            • Opcode Fuzzy Hash: 0a28b651b3b33649a6e9b81280ec953b5004416f205d2bc0fd476c4c80b0b195
                                            • Instruction Fuzzy Hash: 1D1156729002489FCF10DFAAD8447EEBBF5EF48324F248419E525A7250CB759944CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 261 50ec970-50ec9eb VirtualAllocEx 264 50ec9ed-50ec9f3 261->264 265 50ec9f4-50eca19 261->265 264->265
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 050EC9DE
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.375744002.00000000050E0000.00000040.00000001.sdmp, Offset: 050E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_50e0000_vlc.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 344abef96d4ec8990419ba85bafa2cce488402f00952cca234a2ec20905feaaf
                                            • Instruction ID: fb4dd4727423a535caf76fe30da15c28ccaa1840062a50f2e0dccc3e1721aa95
                                            • Opcode Fuzzy Hash: 344abef96d4ec8990419ba85bafa2cce488402f00952cca234a2ec20905feaaf
                                            • Instruction Fuzzy Hash: 9B1137729042499FCF10DFAAD8447EFBBF5EF48324F248419E525A7250CB759944CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions

                                            Execution Graph

                                            Execution Coverage:11.3%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:20
                                            Total number of Limit Nodes:1

                                            Graph

                                            execution_graph 12965 32e0448 12966 32e0452 12965->12966 12968 32e1da3 12965->12968 12969 32e1dac 12968->12969 12973 32e1ea0 12969->12973 12977 32e1e90 12969->12977 12975 32e1ea1 12973->12975 12974 32e1fa4 12974->12974 12975->12974 12981 32e1a88 12975->12981 12978 32e1e9c 12977->12978 12979 32e1fa4 12978->12979 12980 32e1a88 CreateActCtxA 12978->12980 12980->12979 12982 32e2f30 CreateActCtxA 12981->12982 12984 32e2ff3 12982->12984 12985 32eae80 12986 32eae83 12985->12986 12989 32e928c 12986->12989 12988 32eaed5 12991 32ec9a0 LoadLibraryA 12989->12991 12992 32eca92 12991->12992

                                            Executed Functions

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 32e2f24-32e2f2d 1 32e2f5f-32e2ff1 CreateActCtxA 0->1 2 32e2f2f-32e2f5a 0->2 4 32e2ffa-32e3054 1->4 5 32e2ff3-32e2ff9 1->5 2->1 12 32e3056-32e3059 4->12 13 32e3063-32e3067 4->13 5->4 12->13 14 32e3078 13->14 15 32e3069-32e3075 13->15 17 32e3079 14->17 15->14 17->17
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 032E2FE1
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.359956519.00000000032E0000.00000040.00000001.sdmp, Offset: 032E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_32e0000_vlc.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: c19610d153355623871664541264881a52f018550e76111ef3922c9aac56c5b6
                                            • Instruction ID: 3dca1b791c41d339d14de34383b4938adcb672b5e4f4c22c87126fe652e13e57
                                            • Opcode Fuzzy Hash: c19610d153355623871664541264881a52f018550e76111ef3922c9aac56c5b6
                                            • Instruction Fuzzy Hash: 994130B1C00259CFCB20DFA9C884BCEBBB5BF88304F248059D419AB252DB752949CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 18 32e928c-32ec9f7 20 32eca4b-32eca97 LoadLibraryA 18->20 21 32ec9f9-32eca1e 18->21 25 32eca99 20->25 26 32ecaa0-32ecad1 20->26 21->20 27 32eca20-32eca22 21->27 29 32eca9f 25->29 32 32ecad3-32ecad7 26->32 33 32ecae1-32ecb0d 26->33 30 32eca24-32eca2e 27->30 31 32eca45-32eca48 27->31 29->26 35 32eca32-32eca41 30->35 36 32eca30 30->36 31->20 32->33 34 32ecad9 32->34 39 32ecb0f-32ecb16 33->39 40 32eca92-32eca96 33->40 34->33 35->35 38 32eca43 35->38 36->35 38->31 41 32ecb1d-32ecb6f 39->41 42 32ecb18-32ecb1c 39->42 40->29 43 32ecba8-32ecbf3 41->43 44 32ecb71-32ecb7b 41->44 42->41 53 32ecbfc-32ecc2d 43->53 54 32ecbf5-32ecbfb 43->54 44->43 45 32ecb7d-32ecb7f 44->45 47 32ecba2-32ecba5 45->47 48 32ecb81-32ecb8b 45->48 47->43 49 32ecb8f-32ecb9e 48->49 50 32ecb8d 48->50 49->49 52 32ecba0 49->52 50->49 52->47 57 32ecc2f-32ecc33 53->57 58 32ecc3d 53->58 54->53 57->58 59 32ecc35 57->59 60 32ecc3e 58->60 59->58 60->60
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 032ECA87
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.359956519.00000000032E0000.00000040.00000001.sdmp, Offset: 032E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_32e0000_vlc.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 557719f480a1784c0061fb3ec429a43a11e4a4e492928ee3bf8a8277728dea48
                                            • Instruction ID: 594722116fa75ba9add13ee112569825f7f76b05007efe3122ab9355371481e5
                                            • Opcode Fuzzy Hash: 557719f480a1784c0061fb3ec429a43a11e4a4e492928ee3bf8a8277728dea48
                                            • Instruction Fuzzy Hash: 644155B1D106298FDB10DFA9C885B9EBBF5BB48304F148129E815EB380D7749885CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 78 32ec997-32ec99d 79 32ec99f-32ec9f7 78->79 80 32eca1c-32eca1e 78->80 81 32eca4b-32eca97 LoadLibraryA 79->81 82 32ec9f9-32eca19 79->82 80->81 83 32eca20-32eca22 80->83 91 32eca99 81->91 92 32ecaa0-32ecad1 81->92 82->80 84 32eca24-32eca2e 83->84 85 32eca45-32eca48 83->85 87 32eca32-32eca41 84->87 88 32eca30 84->88 85->81 87->87 90 32eca43 87->90 88->87 90->85 94 32eca9f 91->94 95 32ecad3-32ecad7 92->95 96 32ecae1-32ecb0d 92->96 94->92 95->96 97 32ecad9 95->97 99 32ecb0f-32ecb16 96->99 100 32eca92-32eca96 96->100 97->96 101 32ecb1d-32ecb6f 99->101 102 32ecb18-32ecb1c 99->102 100->94 103 32ecba8-32ecbf3 101->103 104 32ecb71-32ecb7b 101->104 102->101 113 32ecbfc-32ecc2d 103->113 114 32ecbf5-32ecbfb 103->114 104->103 105 32ecb7d-32ecb7f 104->105 107 32ecba2-32ecba5 105->107 108 32ecb81-32ecb8b 105->108 107->103 109 32ecb8f-32ecb9e 108->109 110 32ecb8d 108->110 109->109 112 32ecba0 109->112 110->109 112->107 117 32ecc2f-32ecc33 113->117 118 32ecc3d 113->118 114->113 117->118 119 32ecc35 117->119 120 32ecc3e 118->120 119->118 120->120
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 032ECA87
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.359956519.00000000032E0000.00000040.00000001.sdmp, Offset: 032E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_32e0000_vlc.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: f22abfe4d5baadcd33fa9444a646d4200b399981046cd52f2a2a831bbe4d01a0
                                            • Instruction ID: 30d0b335adc52ef3ff8672eec4b98bf01613b7bb257f200549b3104313f86850
                                            • Opcode Fuzzy Hash: f22abfe4d5baadcd33fa9444a646d4200b399981046cd52f2a2a831bbe4d01a0
                                            • Instruction Fuzzy Hash: 8E4155B1D106298FDB10CFE8C88679EBBF5BB48304F14812AD815EB385D7749886CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 61 32e1a88-32e2ff1 CreateActCtxA 64 32e2ffa-32e3054 61->64 65 32e2ff3-32e2ff9 61->65 72 32e3056-32e3059 64->72 73 32e3063-32e3067 64->73 65->64 72->73 74 32e3078 73->74 75 32e3069-32e3075 73->75 77 32e3079 74->77 75->74 77->77
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 032E2FE1
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.359956519.00000000032E0000.00000040.00000001.sdmp, Offset: 032E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_32e0000_vlc.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 6f3806bedcdd8fd7fa85c8dc7533c890c77c6b4a62cafc58ec03fdedc6c5eb03
                                            • Instruction ID: 459cbf04b07abcd2d46ee8203f0de8c3aa13515037bbe90b64171ec0fdf42f42
                                            • Opcode Fuzzy Hash: 6f3806bedcdd8fd7fa85c8dc7533c890c77c6b4a62cafc58ec03fdedc6c5eb03
                                            • Instruction Fuzzy Hash: 52411070C1471DCFDB24DFA9C884B9EBBB5BF48304F24806AD509AB251DB756989CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000014.00000002.359756848.000000000179D000.00000040.00000001.sdmp, Offset: 0179D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_179d000_vlc.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dae556d0209c068011d1f564a47f715c2a52f1293f73d55b1fc13c17f6872f2c
                                            • Instruction ID: b772b17ce55af6e7e4053cf01959cc70a32571f05651b44efccff3bf60df7ea5
                                            • Opcode Fuzzy Hash: dae556d0209c068011d1f564a47f715c2a52f1293f73d55b1fc13c17f6872f2c
                                            • Instruction Fuzzy Hash: 1A212871504240DFDF11DF94E9C0B26FB65FB88328F3485A9E9094B246C336D849C7A1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000014.00000002.359756848.000000000179D000.00000040.00000001.sdmp, Offset: 0179D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_179d000_vlc.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                                            • Instruction ID: 6ff06fb2d87ea418d13a0d6b642e0355d8b2915cb683c3a4bf63c8673c74a3c9
                                            • Opcode Fuzzy Hash: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                                            • Instruction Fuzzy Hash: F111AF76404280CFCF12CF54E5C4B16FF71FB84324F2886A9D8090B656C33AD55ACBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions

                                            Execution Graph

                                            Execution Coverage:9.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:76
                                            Total number of Limit Nodes:3

                                            Graph

                                            execution_graph 16658 2e2ae80 16659 2e2ae9e 16658->16659 16662 2e2928c 16659->16662 16661 2e2aed5 16664 2e2c9a0 LoadLibraryA 16662->16664 16665 2e2ca99 16664->16665 16666 2e20448 16667 2e20452 16666->16667 16676 2e21db1 16666->16676 16681 55f3fb8 16667->16681 16685 55f4c8a 16667->16685 16689 55f400a 16667->16689 16693 55f4000 16667->16693 16697 55f3cd0 16667->16697 16701 55f3fa7 16667->16701 16668 2e204c5 16677 2e21dc5 16676->16677 16705 2e21ea0 16677->16705 16709 2e21e90 16677->16709 16682 55f3fc4 16681->16682 16684 55f3fd3 16681->16684 16683 55f3cd0 5 API calls 16682->16683 16683->16684 16684->16668 16686 55f4c90 16685->16686 16717 55f4184 16686->16717 16688 55f4c97 16688->16668 16690 55f401a 16689->16690 16692 55f402d 16689->16692 16740 55f3ce0 16690->16740 16692->16668 16694 55f4010 16693->16694 16695 55f402d 16694->16695 16696 55f3ce0 4 API calls 16694->16696 16695->16668 16696->16695 16698 55f3cdb 16697->16698 16699 55f4184 5 API calls 16698->16699 16700 55f4c97 16699->16700 16700->16668 16702 55f3fb8 16701->16702 16703 55f3cd0 5 API calls 16702->16703 16704 55f3fd3 16702->16704 16703->16704 16704->16668 16707 2e21ec7 16705->16707 16706 2e21fa4 16706->16706 16707->16706 16713 2e21a88 16707->16713 16711 2e21ec7 16709->16711 16710 2e21fa4 16710->16710 16711->16710 16712 2e21a88 CreateActCtxA 16711->16712 16712->16710 16714 2e22f30 CreateActCtxA 16713->16714 16716 2e22ff3 16714->16716 16718 55f418f 16717->16718 16726 55f4cd0 16718->16726 16727 55f4338 16718->16727 16720 55f4cde 16721 55f4338 5 API calls 16720->16721 16720->16726 16722 55f4d0f 16721->16722 16723 55f4000 4 API calls 16722->16723 16722->16726 16724 55f4db3 16723->16724 16733 55f440c 16724->16733 16726->16688 16728 55f4343 16727->16728 16729 55f4000 4 API calls 16728->16729 16732 55f4d99 16728->16732 16730 55f4db3 16729->16730 16731 55f440c OleInitialize 16730->16731 16731->16732 16732->16720 16734 55f4417 16733->16734 16735 55f50d3 16734->16735 16737 55f4428 16734->16737 16735->16726 16738 55f5108 OleInitialize 16737->16738 16739 55f516c 16738->16739 16739->16735 16741 55f3ceb GetCurrentProcess 16740->16741 16743 55f452b 16741->16743 16744 55f4532 GetCurrentThread 16741->16744 16743->16744 16745 55f456f GetCurrentProcess 16744->16745 16746 55f4568 16744->16746 16747 55f45a5 16745->16747 16746->16745 16748 55f45cd GetCurrentThreadId 16747->16748 16749 55f45fe 16748->16749 16749->16692 16750 55f6570 FindCloseChangeNotification 16751 55f65d7 16750->16751 16752 55f46e0 DuplicateHandle 16753 55f4776 16752->16753

                                            Executed Functions

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 055F4518
                                            • GetCurrentThread.KERNEL32 ref: 055F4555
                                            • GetCurrentProcess.KERNEL32 ref: 055F4592
                                            • GetCurrentThreadId.KERNEL32 ref: 055F45EB
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 068fee6ac6c64dc0554de9fee1611845949e0c84e2933f50a52170199523450a
                                            • Instruction ID: 43f1f4a2e00dc1f5a0d4e00463e73ee5b61ed4a6d751a03973c675a627081fdd
                                            • Opcode Fuzzy Hash: 068fee6ac6c64dc0554de9fee1611845949e0c84e2933f50a52170199523450a
                                            • Instruction Fuzzy Hash: 9F5154B0900648CFDB10DFAAD9497EEBBF1FB48314F20845AE019A7351DB749984CF61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 055F4518
                                            • GetCurrentThread.KERNEL32 ref: 055F4555
                                            • GetCurrentProcess.KERNEL32 ref: 055F4592
                                            • GetCurrentThreadId.KERNEL32 ref: 055F45EB
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 0903836f57adcf85e17a3dfb05323e7b5b97ab1e8158815d5f9b327ef9bad06c
                                            • Instruction ID: 47b80edffb3e7a377df89996692b75212f5997003728f4ce2600838c97729fc1
                                            • Opcode Fuzzy Hash: 0903836f57adcf85e17a3dfb05323e7b5b97ab1e8158815d5f9b327ef9bad06c
                                            • Instruction Fuzzy Hash: 965165B0900648CFDB10EFAAD9497AEBBF1FF48314F20845AE119A7350DB749984CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 45 2e2c996-2e2c99d 46 2e2c9f4-2e2c9f7 45->46 47 2e2c99f-2e2c9f2 45->47 48 2e2ca4b-2e2ca97 LoadLibraryA 46->48 49 2e2c9f9-2e2ca1e 46->49 47->46 52 2e2caa0-2e2cad1 48->52 53 2e2ca99-2e2ca9f 48->53 49->48 54 2e2ca20-2e2ca22 49->54 59 2e2cad3-2e2cad7 52->59 60 2e2cae1 52->60 53->52 56 2e2ca24-2e2ca2e 54->56 57 2e2ca45-2e2ca48 54->57 61 2e2ca32-2e2ca41 56->61 62 2e2ca30 56->62 57->48 59->60 63 2e2cad9 59->63 65 2e2cae2 60->65 61->61 64 2e2ca43 61->64 62->61 63->60 64->57 65->65
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 02E2CA87
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.379257389.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_2e20000_vlc.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: c7071d0bceb03c51406388cfd7d9ec71802588b57dc07d7ce2e487c359045ae0
                                            • Instruction ID: 56ed77dc9f68e0f1f8b72089281cfdab5806eac35f80b17cd6ef44496cf89d5f
                                            • Opcode Fuzzy Hash: c7071d0bceb03c51406388cfd7d9ec71802588b57dc07d7ce2e487c359045ae0
                                            • Instruction Fuzzy Hash: C8412AB1D406688FDB10CFA9C8857DEBBF1BB48318F25A12AD816E7381D7749846CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 66 2e2928c-2e2c9f7 68 2e2ca4b-2e2ca97 LoadLibraryA 66->68 69 2e2c9f9-2e2ca1e 66->69 72 2e2caa0-2e2cad1 68->72 73 2e2ca99-2e2ca9f 68->73 69->68 74 2e2ca20-2e2ca22 69->74 79 2e2cad3-2e2cad7 72->79 80 2e2cae1 72->80 73->72 76 2e2ca24-2e2ca2e 74->76 77 2e2ca45-2e2ca48 74->77 81 2e2ca32-2e2ca41 76->81 82 2e2ca30 76->82 77->68 79->80 83 2e2cad9 79->83 85 2e2cae2 80->85 81->81 84 2e2ca43 81->84 82->81 83->80 84->77 85->85
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?), ref: 02E2CA87
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.379257389.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_2e20000_vlc.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 6d0f7183da260668b0a54df9b40283245a579c2caa0018eb01451ec5a4fc0b0a
                                            • Instruction ID: 3cadc790afa8cf7fb823a0b0c51c9cdeb2311049fac42960c00dee79c6c317cc
                                            • Opcode Fuzzy Hash: 6d0f7183da260668b0a54df9b40283245a579c2caa0018eb01451ec5a4fc0b0a
                                            • Instruction Fuzzy Hash: 06413AB0D406688FDB10CFA9C88579EBBF1FB48318F25A12AD816E7380D7749849CF91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 103 2e22f24-2e22ff1 CreateActCtxA 105 2e22ff3-2e22ff9 103->105 106 2e22ffa-2e23054 103->106 105->106 113 2e23063-2e23067 106->113 114 2e23056-2e23059 106->114 115 2e23078 113->115 116 2e23069-2e23075 113->116 114->113 118 2e23079 115->118 116->115 118->118
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 02E22FE1
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.379257389.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_2e20000_vlc.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 36258b98a836cd471f6eaab90d568925fccaf9891ad597c45f609edba2ceb2c3
                                            • Instruction ID: 8c7cae1bf7a84345aa4f0e09fb49cbf28b0ebc88c19042d1f891b19235ff028f
                                            • Opcode Fuzzy Hash: 36258b98a836cd471f6eaab90d568925fccaf9891ad597c45f609edba2ceb2c3
                                            • Instruction Fuzzy Hash: 6B41F2B1C0465CCFDB24CFA9C884BDEBBB1BF49308F248099D409AB251DB75594ACFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 86 2e21a88-2e22ff1 CreateActCtxA 89 2e22ff3-2e22ff9 86->89 90 2e22ffa-2e23054 86->90 89->90 97 2e23063-2e23067 90->97 98 2e23056-2e23059 90->98 99 2e23078 97->99 100 2e23069-2e23075 97->100 98->97 102 2e23079 99->102 100->99 102->102
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 02E22FE1
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.379257389.0000000002E20000.00000040.00000001.sdmp, Offset: 02E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_2e20000_vlc.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 1453d9e97f27f5549e994af0ff5f2132627eda83d1bf1aab4a53d17cb554c029
                                            • Instruction ID: a79e6b9cb4b25adedbe682f0f61ab87cb7245e0780a493274eb4b67831b99bee
                                            • Opcode Fuzzy Hash: 1453d9e97f27f5549e994af0ff5f2132627eda83d1bf1aab4a53d17cb554c029
                                            • Instruction Fuzzy Hash: 7441E5B1C4472CCBDB14DFA9C844BDEBBB5BF49308F20805AD509AB251DB755949CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 739 55f46d9-55f4774 DuplicateHandle 740 55f477d-55f479a 739->740 741 55f4776-55f477c 739->741 741->740
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055F4767
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: f8934ec88d2fc019e74e23fe0a58d721df379de155d634a8e76fe7ad13a6982c
                                            • Instruction ID: 84045cc2c787be1ef74eeb85c20013d524b9e0ad25239ddf37b1cc1b2723e1e5
                                            • Opcode Fuzzy Hash: f8934ec88d2fc019e74e23fe0a58d721df379de155d634a8e76fe7ad13a6982c
                                            • Instruction Fuzzy Hash: 3A21E0B5901249DFDB10CFA9D984AEEBBF4FB48324F14841AE914B7310D778A945CF60
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 744 55f46e0-55f4774 DuplicateHandle 745 55f477d-55f479a 744->745 746 55f4776-55f477c 744->746 746->745
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055F4767
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: f1ec03debe79b815e2d351ed272d642c4cc8054e6df02c4d558e4a283737feed
                                            • Instruction ID: 4e6d7b3ee0ebfb589bd6817656ba2236b97b4561a31f3520c92f9c1057637b33
                                            • Opcode Fuzzy Hash: f1ec03debe79b815e2d351ed272d642c4cc8054e6df02c4d558e4a283737feed
                                            • Instruction Fuzzy Hash: 4121C2B5901348DFDB10CFAAD984ADEBBF9FB48324F14841AE914A7310D778A945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 749 55f6568-55f656b 750 55f6570-55f65d5 FindCloseChangeNotification 749->750 751 55f65de-55f6606 750->751 752 55f65d7-55f65dd 750->752 752->751
                                            APIs
                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 055F65C8
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: ChangeCloseFindNotification
                                            • String ID:
                                            • API String ID: 2591292051-0
                                            • Opcode ID: d1d78d60deace1b5569996c4f113125fa75c41106f5f12d43b79369c8fab07fd
                                            • Instruction ID: e7c5a39c8ea3bb0245d871e1beda95d379e1a033c81a20386c8f7d7fb55f2170
                                            • Opcode Fuzzy Hash: d1d78d60deace1b5569996c4f113125fa75c41106f5f12d43b79369c8fab07fd
                                            • Instruction Fuzzy Hash: D01125B28007598FCB10DF99D485BDEBBF4FB48324F24841AD559A7740CB38A949CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 755 55f6570-55f65d5 FindCloseChangeNotification 756 55f65de-55f6606 755->756 757 55f65d7-55f65dd 755->757 757->756
                                            APIs
                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 055F65C8
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: ChangeCloseFindNotification
                                            • String ID:
                                            • API String ID: 2591292051-0
                                            • Opcode ID: d2b0f40f91242b1342625dba8b852574dd547a80dd9a9bc8392f7c7aa75e42e7
                                            • Instruction ID: e09c7aa3dc390510672f57806b5162f5283c8e78e8eb199d835eea4b7276dfd1
                                            • Opcode Fuzzy Hash: d2b0f40f91242b1342625dba8b852574dd547a80dd9a9bc8392f7c7aa75e42e7
                                            • Instruction Fuzzy Hash: 4E1103B18007498FCB10DF99D445BEEBBF4FB48324F24841AD559A7740DB38AA45CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 760 55f4428-55f516a OleInitialize 762 55f516c-55f5172 760->762 763 55f5173-55f5190 760->763 762->763
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 055F515D
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 17d5a82fab40c48e16299a869b2df924c1de06b4a06900ae063154ec50515219
                                            • Instruction ID: 2a44f9d8f1763b67af86cc6ed414b9a5c312c90b2ee19463ed8e30545df3caff
                                            • Opcode Fuzzy Hash: 17d5a82fab40c48e16299a869b2df924c1de06b4a06900ae063154ec50515219
                                            • Instruction Fuzzy Hash: 4A1115B19047488FCB10DFAAD845BDEBBF4FB48324F20841AD559A7700D774A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 766 55f5100-55f516a OleInitialize 767 55f516c-55f5172 766->767 768 55f5173-55f5190 766->768 767->768
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 055F515D
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.381712267.00000000055F0000.00000040.00000001.sdmp, Offset: 055F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_55f0000_vlc.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 2369f4843c5c68066210291d52cfaefc1915a0ff0eba738b894ebc00c003fafd
                                            • Instruction ID: 7c3b788120f78775c8d34358326c50efef0ec02f7e3e951ad23116b37396d83a
                                            • Opcode Fuzzy Hash: 2369f4843c5c68066210291d52cfaefc1915a0ff0eba738b894ebc00c003fafd
                                            • Instruction Fuzzy Hash: 1E1130B19003488FCB10DFA9D849BDEBBF4BB48324F24841AD119B7700D778A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000015.00000002.378527632.0000000002DBD000.00000040.00000001.sdmp, Offset: 02DBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_2dbd000_vlc.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 33fe53f9f7c3578dba07004c723e12574cc9ac705a7241d984192673dd74b603
                                            • Instruction ID: 070f2b5cae9d8a0ff3a22d4066a189b8f74a89890d6fe9edaea52b09622ff3bd
                                            • Opcode Fuzzy Hash: 33fe53f9f7c3578dba07004c723e12574cc9ac705a7241d984192673dd74b603
                                            • Instruction Fuzzy Hash: 76213A71504240DFDB06DF54D9D0B56BBA6FF89328F24856DE90A4B346C336DC45C7A2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000015.00000002.378527632.0000000002DBD000.00000040.00000001.sdmp, Offset: 02DBD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_2dbd000_vlc.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                                            • Instruction ID: b7cfd4a6059cc58223af5e7b0bc3deddaf037dbf193dcc0516a28c5ab1b812d7
                                            • Opcode Fuzzy Hash: 475f330473868ad3c29f7e884537fa5e2c046c0b54d26c118bd7d839c6bfe152
                                            • Instruction Fuzzy Hash: 2011D676404240CFCB12CF10D5C4B56BFB2FF85324F2486A9D8050B756C33AD856CBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions