Loading ...

Play interactive tourEdit tour

Windows Analysis Report 41609787.exe

Overview

General Information

Sample Name:41609787.exe
Analysis ID:452431
MD5:242fb5498503fdae24861ca26f762745
SHA1:e45e4180137ea7c9d81f127fac0af48cf3b4e8d7
SHA256:7984d85806d611e8d7e3ec5640186ebce9b1daccbd07a4bbda0fc6e0e5666299
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
GuLoader behavior detected
Multi AV Scanner detection for domain / URL
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Installs a global keyboard hook
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

Process Tree

  • System is w10x64
  • 41609787.exe (PID: 4548 cmdline: 'C:\Users\user\Desktop\41609787.exe' MD5: 242FB5498503FDAE24861CA26F762745)
    • ieinstal.exe (PID: 2120 cmdline: 'C:\Users\user\Desktop\41609787.exe' MD5: DAD17AB737E680C47C8A44CBB95EE67E)
      • cmd.exe (PID: 4608 cmdline: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 5156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • reg.exe (PID: 5776 cmdline: C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: CEE2A7E57DF2A159A065A34913A055C2)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://smokeadmsend.online/loade"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://smokeadmsend.online/loade"}
      Multi AV Scanner detection for domain / URLShow sources
      Source: databasepropersonombrecomercialideasearchwords.servicesVirustotal: Detection: 11%Perma Link
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY
      Source: 41609787.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: unknownHTTPS traffic detected: 198.54.115.48:443 -> 192.168.2.3:49752 version: TLS 1.2

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: https://smokeadmsend.online/loade
      Source: global trafficTCP traffic: 192.168.2.3:49753 -> 186.169.69.166:2508
      Source: Joe Sandbox ViewASN Name: COLOMBIATELECOMUNICACIONESSAESPCO COLOMBIATELECOMUNICACIONESSAESPCO
      Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownDNS traffic detected: queries for: smokeadmsend.online
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpString found in binary or memory: https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.bin
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpString found in binary or memory: https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.0
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
      Source: unknownHTTPS traffic detected: 198.54.115.48:443 -> 192.168.2.3:49752 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Installs a global keyboard hookShow sources
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\internet explorer\ieinstal.exeJump to behavior

      E-Banking Fraud:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\41609787.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A1 NtSetInformationThread,0_2_021107A1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021013C1 NtWriteVirtualMemory,TerminateProcess,0_2_021013C1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02110176 NtProtectVirtualMemory,0_2_02110176
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107E15 NtWriteVirtualMemory,0_2_02107E15
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108607 NtWriteVirtualMemory,0_2_02108607
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210720B NtWriteVirtualMemory,0_2_0210720B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210762B NtWriteVirtualMemory,0_2_0210762B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210825E NtWriteVirtualMemory,0_2_0210825E
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108677 NtWriteVirtualMemory,0_2_02108677
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107A95 NtWriteVirtualMemory,0_2_02107A95
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210669A NtWriteVirtualMemory,LoadLibraryA,0_2_0210669A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210829B NtWriteVirtualMemory,0_2_0210829B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210728B NtWriteVirtualMemory,0_2_0210728B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107EA3 NtWriteVirtualMemory,0_2_02107EA3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021076E5 NtWriteVirtualMemory,0_2_021076E5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108703 NtWriteVirtualMemory,0_2_02108703
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107305 NtWriteVirtualMemory,0_2_02107305
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F21 NtWriteVirtualMemory,0_2_02105F21
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02108324 NtWriteVirtualMemory,0_2_02108324
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107F2C NtWriteVirtualMemory,0_2_02107F2C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107B2D NtWriteVirtualMemory,0_2_02107B2D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107381 NtWriteVirtualMemory,0_2_02107381
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107FB3 NtWriteVirtualMemory,0_2_02107FB3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021083B7 NtWriteVirtualMemory,0_2_021083B7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107BC0 NtWriteVirtualMemory,0_2_02107BC0
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021077EF NtWriteVirtualMemory,0_2_021077EF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210741B NtWriteVirtualMemory,0_2_0210741B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107801 NtWriteVirtualMemory,0_2_02107801
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210843F NtWriteVirtualMemory,0_2_0210843F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210802F NtWriteVirtualMemory,0_2_0210802F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107C4F NtWriteVirtualMemory,0_2_02107C4F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107879 NtWriteVirtualMemory,0_2_02107879
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210749C NtWriteVirtualMemory,0_2_0210749C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021070AF NtWriteVirtualMemory,0_2_021070AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021084D1 NtWriteVirtualMemory,0_2_021084D1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021080C7 NtWriteVirtualMemory,0_2_021080C7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107CE5 NtWriteVirtualMemory,0_2_02107CE5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210711D NtWriteVirtualMemory,0_2_0210711D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107903 NtWriteVirtualMemory,0_2_02107903
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02103D32 NtWriteVirtualMemory,0_2_02103D32
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210813C NtWriteVirtualMemory,0_2_0210813C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107529 NtWriteVirtualMemory,0_2_02107529
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210794C NtWriteVirtualMemory,0_2_0210794C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107D6B NtWriteVirtualMemory,0_2_02107D6B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107191 NtWriteVirtualMemory,0_2_02107191
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210799F NtWriteVirtualMemory,0_2_0210799F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DB4 NtWriteVirtualMemory,0_2_02107DB4
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081A7 NtWriteVirtualMemory,0_2_021081A7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021075A9 NtWriteVirtualMemory,0_2_021075A9
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DF5 NtWriteVirtualMemory,0_2_02107DF5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081FF NtWriteVirtualMemory,0_2_021081FF
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_03011587 LdrInitializeThunk,Sleep,LdrInitializeThunk,NtProtectVirtualMemory,27_2_03011587
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030116CC NtProtectVirtualMemory,27_2_030116CC
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_0301156F LdrInitializeThunk,Sleep,LdrInitializeThunk,NtProtectVirtualMemory,27_2_0301156F
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_03011687 NtProtectVirtualMemory,NtProtectVirtualMemory,27_2_03011687
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_0301174E NtProtectVirtualMemory,27_2_0301174E
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030116D3 NtProtectVirtualMemory,27_2_030116D3
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030117D3 NtProtectVirtualMemory,27_2_030117D3
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_030115E3 LdrInitializeThunk,NtProtectVirtualMemory,27_2_030115E3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_004014F00_2_004014F0
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210EB030_2_0210EB03
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A10_2_021107A1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021013C10_2_021013C1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021091300_2_02109130
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107E150_2_02107E15
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106A1F0_2_02106A1F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210720B0_2_0210720B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101E3A0_2_02101E3A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021016290_2_02101629
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210362A0_2_0210362A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210222A0_2_0210222A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210762B0_2_0210762B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101A2F0_2_02101A2F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021046510_2_02104651
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021022590_2_02102259
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210825E0_2_0210825E
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100E470_2_02100E47
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107A950_2_02107A95
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210169A0_2_0210169A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210669A0_2_0210669A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210829B0_2_0210829B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210728B0_2_0210728B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101AB70_2_02101AB7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107EA30_2_02107EA3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104AAD0_2_02104AAD
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100EDB0_2_02100EDB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021022DF0_2_021022DF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101EC40_2_02101EC4
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021046FB0_2_021046FB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021076E50_2_021076E5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021017150_2_02101715
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021087030_2_02108703
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021073050_2_02107305
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021047300_2_02104730
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101B370_2_02101B37
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101F3F0_2_02101F3F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F210_2_02105F21
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021083240_2_02108324
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107F2C0_2_02107F2C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107B2D0_2_02107B2D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210032F0_2_0210032F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021023590_2_02102359
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100F790_2_02100F79
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101F930_2_02101F93
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210179F0_2_0210179F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021073810_2_02107381
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021013870_2_02101387
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107FB30_2_02107FB3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021083B70_2_021083B7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101BBD0_2_02101BBD
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02109BD10_2_02109BD1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107BC00_2_02107BC0
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106BC70_2_02106BC7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101FF60_2_02101FF6
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021023EA0_2_021023EA
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100FEF0_2_02100FEF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021077EF0_2_021077EF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021018190_2_02101819
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210741B0_2_0210741B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021078010_2_02107801
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021048020_2_02104802
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210D4040_2_0210D404
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106C0F0_2_02106C0F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101C370_2_02101C37
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106C370_2_02106C37
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210843F0_2_0210843F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210EC2A0_2_0210EC2A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210802F0_2_0210802F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021030530_2_02103053
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021020430_2_02102043
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107C4F0_2_02107C4F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021064720_2_02106472
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021078790_2_02107879
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210107F0_2_0210107F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210146D0_2_0210146D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021018900_2_02101890
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210749C0_2_0210749C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021048800_2_02104880
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021024A70_2_021024A7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021064AF0_2_021064AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021070AF0_2_021070AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021084D10_2_021084D1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021080C70_2_021080C7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021060CB0_2_021060CB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106CE10_2_02106CE1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107CE50_2_02107CE5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021049140_2_02104914
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021019180_2_02101918
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210451B0_2_0210451B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210711D0_2_0210711D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021015030_2_02101503
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021079030_2_02107903
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02103D320_2_02103D32
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021019340_2_02101934
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210813C0_2_0210813C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021075290_2_02107529
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210794C0_2_0210794C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210B9620_2_0210B962
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107D6B0_2_02107D6B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021015910_2_02101591
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021071910_2_02107191
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210699F0_2_0210699F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210799F0_2_0210799F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02106D850_2_02106D85
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DB40_2_02107DB4
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02101DB70_2_02101DB7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210D5B80_2_0210D5B8
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210F9A30_2_0210F9A3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081A70_2_021081A7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021075A90_2_021075A9
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021055AB0_2_021055AB
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021019AF0_2_021019AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021069D90_2_021069D9
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021021DF0_2_021021DF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210B1C30_2_0210B1C3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02100DF10_2_02100DF1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DF50_2_02107DF5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021081FF0_2_021081FF
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 27_2_0301136D27_2_0301136D
      Source: 41609787.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 41609787.exe, 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameImpennate7.exe vs 41609787.exe
      Source: 41609787.exeBinary or memory string: OriginalFilenameImpennate7.exe vs 41609787.exe
      Source: 41609787.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/2@3/2
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile created: C:\Users\user\AppData\Roaming\Runtime2021Jump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeMutant created: \Sessions\1\BaseNamedObjects\RemcosLEG-0OFGX3
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5156:120:WilError_01
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile created: C:\Users\user\AppData\Local\Temp\posekiggerneJump to behavior
      Source: 41609787.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\41609787.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
      Source: C:\Users\user\Desktop\41609787.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\41609787.exe 'C:\Users\user\Desktop\41609787.exe'
      Source: C:\Users\user\Desktop\41609787.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\41609787.exe'
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
      Source: C:\Users\user\Desktop\41609787.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\41609787.exe' Jump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061774 push edx; ret 0_2_020617A1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064205 push edx; ret 0_2_02064231
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062A05 push edx; ret 0_2_02062A31
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061205 push edx; ret 0_2_02061231
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065A03 push edx; ret 0_2_02065A31
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066214 push edx; ret 0_2_02066241
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064A13 push edx; ret 0_2_02064A41
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063213 push edx; ret 0_2_02063241
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061A13 push edx; ret 0_2_02061A41
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060218 push edx; ret 0_2_02060241
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063A24 push edx; ret 0_2_02063A51
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062224 push edx; ret 0_2_02062251
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060A24 push edx; ret 0_2_02060A51
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066A24 push edx; ret 0_2_02066A51
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065225 push edx; ret 0_2_02065251
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064233 push edx; ret 0_2_02064261
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062A33 push edx; ret 0_2_02062A61
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061233 push edx; ret 0_2_02061261
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065A33 push edx; ret 0_2_02065A61
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064A44 push edx; ret 0_2_02064A71
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063244 push edx; ret 0_2_02063271
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02061A44 push edx; ret 0_2_02061A71
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066244 push edx; ret 0_2_02066271
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060248 push edx; ret 0_2_02060271
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02063A54 push edx; ret 0_2_02063A81
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02062254 push edx; ret 0_2_02062281
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02066A54 push edx; ret 0_2_02066A81
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065253 push edx; ret 0_2_02065281
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02060A58 push edx; ret 0_2_02060A81
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02065A64 push edx; ret 0_2_02065A91
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02064263 push edx; ret 0_2_02064291
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SPINTOSJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SPINTOSJump to behavior
      Source: C:\Users\user\Desktop\41609787.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021013C1 NtWriteVirtualMemory,TerminateProcess,0_2_021013C1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107E15 NtWriteVirtualMemory,0_2_02107E15
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210720B NtWriteVirtualMemory,0_2_0210720B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210222A 0_2_0210222A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210762B NtWriteVirtualMemory,0_2_0210762B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02104651 0_2_02104651
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02102259 TerminateProcess,0_2_02102259
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107A95 NtWriteVirtualMemory,0_2_02107A95
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210669A NtWriteVirtualMemory,LoadLibraryA,0_2_0210669A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210728B NtWriteVirtualMemory,0_2_0210728B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107EA3 NtWriteVirtualMemory,0_2_02107EA3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021022DF 0_2_021022DF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021076E5 NtWriteVirtualMemory,0_2_021076E5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107305 NtWriteVirtualMemory,0_2_02107305
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F21 NtWriteVirtualMemory,0_2_02105F21
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107F2C NtWriteVirtualMemory,0_2_02107F2C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107B2D NtWriteVirtualMemory,0_2_02107B2D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210032F LdrInitializeThunk,0_2_0210032F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02102359 0_2_02102359
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107381 NtWriteVirtualMemory,0_2_02107381
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107FB3 NtWriteVirtualMemory,0_2_02107FB3
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107BC0 NtWriteVirtualMemory,0_2_02107BC0
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021023EA 0_2_021023EA
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021077EF NtWriteVirtualMemory,0_2_021077EF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210741B NtWriteVirtualMemory,0_2_0210741B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107801 NtWriteVirtualMemory,0_2_02107801
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107C4F NtWriteVirtualMemory,0_2_02107C4F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107879 NtWriteVirtualMemory,0_2_02107879
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210749C NtWriteVirtualMemory,0_2_0210749C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021024A7 0_2_021024A7
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021070AF NtWriteVirtualMemory,0_2_021070AF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107CE5 NtWriteVirtualMemory,0_2_02107CE5
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210451B 0_2_0210451B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210711D NtWriteVirtualMemory,0_2_0210711D
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107903 NtWriteVirtualMemory,0_2_02107903
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02103D32 NtWriteVirtualMemory,0_2_02103D32
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107529 NtWriteVirtualMemory,0_2_02107529
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210794C NtWriteVirtualMemory,0_2_0210794C
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107D6B NtWriteVirtualMemory,0_2_02107D6B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107191 NtWriteVirtualMemory,0_2_02107191
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210799F NtWriteVirtualMemory,0_2_0210799F
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DB4 NtWriteVirtualMemory,0_2_02107DB4
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021075A9 NtWriteVirtualMemory,0_2_021075A9
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021021DF TerminateProcess,0_2_021021DF
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02107DF5 NtWriteVirtualMemory,0_2_02107DF5
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\41609787.exeRDTSC instruction interceptor: First address: 000000000210047C second address: 000000000210047C instructions:
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\41609787.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Users\user\Desktop\41609787.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32MSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=PROGRAMFILES=\INTERNET EXPLORER\IEINSTAL.EXEWINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmp, ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32MSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=\OPTRNER.EXE\POSEKIGGERNESOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNSPINTOSHTTPS://SMOKEADMSEND.ONLINE/LOADER/1ARMADANAC1COPIA_YCUSOPUSF143.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\41609787.exeRDTSC instruction interceptor: First address: 000000000210047C second address: 000000000210047C instructions:
      Source: C:\Users\user\Desktop\41609787.exeRDTSC instruction interceptor: First address: 000000000210DA09 second address: 000000000210DA09 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 add esi, 02h 0x00000006 mov word ptr [ebp+00000176h], ax 0x0000000d mov ax, word ptr [esi] 0x00000010 cmp ax, 0000h 0x00000014 mov ax, word ptr [ebp+00000176h] 0x0000001b jne 00007F5CC09CC9EFh 0x0000001d mov ebx, edx 0x0000001f shl edx, 05h 0x00000022 add edx, ebx 0x00000024 movzx ebx, byte ptr [esi] 0x00000027 add edx, ebx 0x00000029 xor edx, 19974490h 0x0000002f jmp 00007F5CC09CCA9Eh 0x00000031 pushad 0x00000032 mov edx, 0000000Dh 0x00000037 rdtsc
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A1 rdtsc 0_2_021107A1
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindow / User API: threadDelayed 1353Jump to behavior
      Source: C:\Users\user\Desktop\41609787.exeAPI coverage: 9.9 %
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe TID: 1936Thread sleep count: 1353 > 30Jump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeLast function: Thread delayed
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread sleep count: Count: 1353 delay: -5Jump to behavior
      Source: ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32Msi.dllPublishershell32advapi32TEMP=\optrner.exe\posekiggerneSoftware\Microsoft\Windows\CurrentVersion\RunSPINTOShttps://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32Msi.dllPublishershell32advapi32TEMP=ProgramFiles=\internet explorer\ieinstal.exewindir=\syswow64\msvbvm60.dll
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: 41609787.exe, 00000000.00000002.669638225.00000000020E0000.00000004.00000001.sdmp, ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: reg.exe, 0000001F.00000002.669516417.00000000008C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\41609787.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\41609787.exeProcess queried: DebugPortJump to behavior
      Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021107A1 rdtsc 0_2_021107A1
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210A907 LdrInitializeThunk,0_2_0210A907
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210EB03 mov eax, dword ptr fs:[00000030h]0_2_0210EB03
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210CE1B mov eax, dword ptr fs:[00000030h]0_2_0210CE1B
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_02105F21 mov eax, dword ptr fs:[00000030h]0_2_02105F21
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210943A mov eax, dword ptr fs:[00000030h]0_2_0210943A
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_0210D822 mov eax, dword ptr fs:[00000030h]0_2_0210D822
      Source: C:\Users\user\Desktop\41609787.exeCode function: 0_2_021055AB mov eax, dword ptr fs:[00000030h]0_2_021055AB

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\41609787.exeMemory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 3000000Jump to behavior
      Source: C:\Users\user\Desktop\41609787.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\41609787.exe' Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: xlogs201.dat.27.drBinary or memory string: [ Program Manager ]
      Source: ieinstal.exe, 0000001B.00000002.726234403.0000000003800000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected Remcos RATShow sources
      Source: Yara matchFile source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection112Masquerading1Input Capture11Security Software Discovery621Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Modify Registry1LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion23Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery311VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      SourceDetectionScannerLabelLink
      databasepropersonombrecomercialideasearchwords.services11%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.bin0%Avira URL Cloudsafe
      https://smokeadmsend.online/loade0%Avira URL Cloudsafe
      https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.00%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      smokeadmsend.online
      198.54.115.48
      truetrue
        unknown
        databasepropersonombrecomercialideasearchwords.services
        186.169.69.166
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        https://smokeadmsend.online/loadetrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://smokeadmsend.online/loader/1ArmadaNac1copia_YCusoPusF143.binwininet.dllMozilla/5.0ieinstal.exe, 0000001B.00000002.725990141.00000000031E0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        186.169.69.166
        databasepropersonombrecomercialideasearchwords.servicesColombia
        3816COLOMBIATELECOMUNICACIONESSAESPCOtrue
        198.54.115.48
        smokeadmsend.onlineUnited States
        22612NAMECHEAP-NETUStrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:452431
        Start date:22.07.2021
        Start time:10:40:48
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 9m 1s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:41609787.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:32
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.spyw.evad.winEXE@8/2@3/2
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 1.6% (good quality ratio 0.1%)
        • Quality average: 4.8%
        • Quality standard deviation: 11.9%
        HCA Information:
        • Successful, ratio: 68%
        • Number of executed functions: 137
        • Number of non-executed functions: 51
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 23.211.6.115, 104.43.193.48, 20.82.210.154, 23.211.4.86, 173.222.108.226, 173.222.108.210, 51.103.5.186, 40.112.88.60, 80.67.82.235, 80.67.82.211, 20.82.209.183, 20.54.110.249
        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, client.wns.windows.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        10:45:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SPINTOS C:\Users\user\AppData\Local\Temp\posekiggerne\optrner.exe
        10:45:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SPINTOS C:\Users\user\AppData\Local\Temp\posekiggerne\optrner.exe

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        198.54.115.4875PO9981.exeGet hashmaliciousBrowse
        • www.ownfiles.info/fl/
        21PO7513.exeGet hashmaliciousBrowse
        • www.ownfiles.info/fl/

        Domains

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        databasepropersonombrecomercialideasearchwords.services75030908.exeGet hashmaliciousBrowse
        • 186.169.42.8
        76947851729_.exeGet hashmaliciousBrowse
        • 181.235.3.85
        166691_pdf.exeGet hashmaliciousBrowse
        • 181.235.4.212
        Factura Serfinanza051053709735077235764653194.exeGet hashmaliciousBrowse
        • 186.169.43.144
        056373_pdf.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza023854786775241209783648129.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza085399218111227761873550570.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza038612482397383420891150743.exeGet hashmaliciousBrowse
        • 186.169.43.144
        Factura Serfinanza106109596363318359608727771.exeGet hashmaliciousBrowse
        • 186.169.72.174
        Factura Serfinanza050288227788749652817960744.exeGet hashmaliciousBrowse
        • 186.169.72.174
        Factura Serfinanza049997609832517851274630184.exeGet hashmaliciousBrowse
        • 186.169.72.174
        EXTRACTOSERFINANZA718365418101786154346661555.exeGet hashmaliciousBrowse
        • 190.255.84.57
        EXTRACTOSERFINANZA989543704031499704092798964.exeGet hashmaliciousBrowse
        • 190.255.84.57
        32657046_pdf.exeGet hashmaliciousBrowse
        • 190.255.84.57
        6565426875_p.exeGet hashmaliciousBrowse
        • 186.169.38.241
        4831902122_p.exeGet hashmaliciousBrowse
        • 186.169.38.241
        8992538102_p.exeGet hashmaliciousBrowse
        • 186.169.38.241
        9604_pdf.exeGet hashmaliciousBrowse
        • 186.169.38.241
        Factura Serfinanza089768553548090985869814228.exeGet hashmaliciousBrowse
        • 186.169.38.241
        EXTRACTOSERFINANZA894978636268808051252452885.exeGet hashmaliciousBrowse
        • 186.169.38.241

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        COLOMBIATELECOMUNICACIONESSAESPCOU1R7Ed7940Get hashmaliciousBrowse
        • 186.113.206.66
        oEF7GAiRIgGet hashmaliciousBrowse
        • 186.113.131.237
        BTNNG17tlhGet hashmaliciousBrowse
        • 190.255.99.57
        MD5OxTSc6iGet hashmaliciousBrowse
        • 190.252.136.167
        SUpODCSauSGet hashmaliciousBrowse
        • 191.109.106.145
        TFG18FA4eDGet hashmaliciousBrowse
        • 152.205.93.205
        eAtDhymLzpGet hashmaliciousBrowse
        • 181.235.115.105
        ehn0f1d63MGet hashmaliciousBrowse
        • 186.116.212.222
        zWumjXhWWzGet hashmaliciousBrowse
        • 190.254.50.129
        e4qhQIKEimGet hashmaliciousBrowse
        • 179.48.76.227
        YazlX01sZDGet hashmaliciousBrowse
        • 186.116.154.100
        7Pvt6Jni6pGet hashmaliciousBrowse
        • 167.65.244.226
        a1sMR3Vj8oGet hashmaliciousBrowse
        • 167.2.131.28
        471u0A1FPwGet hashmaliciousBrowse
        • 190.255.75.41
        395d6gwkWKGet hashmaliciousBrowse
        • 152.205.93.229
        YXYFqHRx2mGet hashmaliciousBrowse
        • 167.13.146.158
        XfKsLIPLUuGet hashmaliciousBrowse
        • 190.67.85.74
        Z7bNxhhS7yGet hashmaliciousBrowse
        • 190.67.85.63
        lq2609LxT8Get hashmaliciousBrowse
        • 190.254.187.199
        khGshuibcrGet hashmaliciousBrowse
        • 186.116.212.225
        NAMECHEAP-NETUSORDER . 4500028602 .docGet hashmaliciousBrowse
        • 198.54.122.60
        Payment_invoice.exeGet hashmaliciousBrowse
        • 198.54.117.212
        SUpODCSauSGet hashmaliciousBrowse
        • 198.54.114.130
        0ZZqw52a6S.exeGet hashmaliciousBrowse
        • 199.193.7.228
        nZdwtTEYoW.exeGet hashmaliciousBrowse
        • 198.54.122.60
        CORRECT BANK DETAILS FORM.docGet hashmaliciousBrowse
        • 198.54.122.60
        Shipping Documents .docGet hashmaliciousBrowse
        • 198.54.122.60
        QxnlprRUTx.exeGet hashmaliciousBrowse
        • 199.188.200.230
        0Lh7eA2VUZ.exeGet hashmaliciousBrowse
        • 198.54.122.60
        REQUEST FOR QUOTATIO 158930165.docGet hashmaliciousBrowse
        • 198.54.122.60
        Statement.xlsxGet hashmaliciousBrowse
        • 162.0.237.9
        Inv PKF312021.docGet hashmaliciousBrowse
        • 198.54.122.60
        RFQ- ROTO Fittings- 19072021.docGet hashmaliciousBrowse
        • 198.54.122.60
        INVOICE.exeGet hashmaliciousBrowse
        • 198.54.117.211
        Order.exeGet hashmaliciousBrowse
        • 198.54.117.215
        SOA.exeGet hashmaliciousBrowse
        • 198.54.122.60
        Inv_7623980.exeGet hashmaliciousBrowse
        • 63.250.34.223
        xBMx9OBP97.exeGet hashmaliciousBrowse
        • 198.54.114.131
        CSyG3zNcwS.exeGet hashmaliciousBrowse
        • 198.54.114.131
        BrCi5pJr8J.exeGet hashmaliciousBrowse
        • 198.54.114.131

        JA3 Fingerprints

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        37f463bf4616ecd445d4a1937da06e19B5xK9XEvzO.exeGet hashmaliciousBrowse
        • 198.54.115.48
        RsEvjI1iTt.exeGet hashmaliciousBrowse
        • 198.54.115.48
        ORD.pptGet hashmaliciousBrowse
        • 198.54.115.48
        39pfFwU3Ns.exeGet hashmaliciousBrowse
        • 198.54.115.48
        47a8af.exe.exeGet hashmaliciousBrowse
        • 198.54.115.48
        Comprobante1.vbsGet hashmaliciousBrowse
        • 198.54.115.48
        ZlvFNj.dllGet hashmaliciousBrowse
        • 198.54.115.48
        QT2kxM315B.exeGet hashmaliciousBrowse
        • 198.54.115.48
        4QKHQR82Xt.exeGet hashmaliciousBrowse
        • 198.54.115.48
        Convert HEX uit phishing mail.htmGet hashmaliciousBrowse
        • 198.54.115.48
        #U2706_#U260e_Play _to _Listen.htmGet hashmaliciousBrowse
        • 198.54.115.48
        192-3216-Us.gt.com.htmlGet hashmaliciousBrowse
        • 198.54.115.48
        N41101255652.vbsGet hashmaliciousBrowse
        • 198.54.115.48
        FILE_2932NH_9923.exeGet hashmaliciousBrowse
        • 198.54.115.48
        RDlkHCLRxE.exeGet hashmaliciousBrowse
        • 198.54.115.48
        #U2706_#U260e_Play _to _Listen.htmGet hashmaliciousBrowse
        • 198.54.115.48
        Swift_Fattura_0093320128_.exeGet hashmaliciousBrowse
        • 198.54.115.48
        SecuriteInfo.com.Variant.Graftor.981190.24096.exeGet hashmaliciousBrowse
        • 198.54.115.48
        IPVrDRKfYj.exeGet hashmaliciousBrowse
        • 198.54.115.48
        11.docxGet hashmaliciousBrowse
        • 198.54.115.48

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Temp\posekiggerne\optrner.exe
        Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
        File Type:data
        Category:dropped
        Size (bytes):192513
        Entropy (8bit):5.613557039365368
        Encrypted:false
        SSDEEP:3072:2+ogFpSWSqqbZ0ZEuwGE5pwFGHiG1InFGHiPZEuwGE5pi:2+7AtqqbZFfGE5pakipkiufGE5pi
        MD5:873CC0BFAAB852FD58C0EB4B8D29026D
        SHA1:07C871EC1385B80D314A9EA0B047CC85D24CEE24
        SHA-256:9E6B7578CAE3E4CC0354AD9912EA36F7E3D0968DE07D30C4F3C60C1183D919C6
        SHA-512:A7609B36561ACD7AACAD21ABF085489C86A72103FCE5F32501B2B660644C6DF1AC5A4A201E39DF67F21D6F3E5C519EC3C51A633E99D8FED07D425497E84997F3
        Malicious:false
        Reputation:low
        Preview: .Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.........+O.E..E..E.X.K..E...L..E..H..E.Rich.E.................PE..L.....1M.................@...................P....@.................................c........................................E..(....p......................................................................0... .......D............................text....;.......@.................. ..`.data...$....P.......P..............@....rsrc........p.......`..............@..@..^............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Roaming\Runtime2021\xlogs201.dat
        Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
        File Type:data
        Category:dropped
        Size (bytes):182
        Entropy (8bit):3.366956781623735
        Encrypted:false
        SSDEEP:3:rklKlVnGlNWKUel5JWRal2Jl+7R0DAlBG4J+Rf3GLilXIknNQblovDl9il:IlK/yN+65YcIeeDAlgRf2e56bW/G
        MD5:CBD9A222C0C0CB1C08C8DC24D7C02F86
        SHA1:40FCA05C695340804995E29FDD5D11A488D8CAEA
        SHA-256:A59E7F82238F3158F2F86EFEFA0A8FB20ACEA309AD84DD61683639197D01A01C
        SHA-512:485877FC044D8046B408C5157BCB29FB3DC06B7DB10695F5886474398217B54EE8A2607527B292D3B179E37904C31FB186FB140ECBA375D7AAE360E6DBDFF44C
        Malicious:false
        Reputation:low
        Preview: ....[.2.0.2.1./.0.7./.2.2. .1.0.:.4.5.:.1.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[. .R.u.n. .].....[.W.i.n.].r.....[. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r. .].....

        Static File Info

        General

        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.613575589393616
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.15%
        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:41609787.exe
        File size:192512
        MD5:242fb5498503fdae24861ca26f762745
        SHA1:e45e4180137ea7c9d81f127fac0af48cf3b4e8d7
        SHA256:7984d85806d611e8d7e3ec5640186ebce9b1daccbd07a4bbda0fc6e0e5666299
        SHA512:5717a9d38ff151384fe522b5b55f7a4882bcb897d65d1c9fbd0b155f05138cc698db39805d34150daf5260906d8e09d6d752190e7d681eb181eb3569378a48fd
        SSDEEP:3072:F+ogFpSWSqqbZ0ZEuwGE5pwFGHiG1InFGHiPZEuwGE5p:F+7AtqqbZFfGE5pakipkiufGE5p
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........+O..E...E...E.X.K...E...L...E...H...E.Rich..E.................PE..L.....1M.................@...................P....@........

        File Icon

        Icon Hash:734c5974650d010d

        Static PE Info

        General

        Entrypoint:0x4014f0
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x4D31AB09 [Sat Jan 15 14:11:21 2011 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:a70b1f0c9f8eea03c5b5d32861bccaa9

        Entrypoint Preview

        Instruction
        push 00401F04h
        call 00007F5CC0966285h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        xor byte ptr [eax], al
        add byte ptr [eax], al
        inc eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [edx+43347C7Eh], bh
        dec ebx
        inc edi
        dec ebp
        mov cl, E1h
        mov ss, word ptr [906A07DAh]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add dword ptr [eax], eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        jo 00007F5CC09662F3h
        jo 00007F5CC09662FBh
        jc 00007F5CC0966305h
        je 00007F5CC0966304h
        jc 00007F5CC09662F7h
        insb
        jnc 00007F5CC09662F7h
        jc 00007F5CC0966305h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add bh, bh
        int3
        xor dword ptr [eax], eax
        sbb byte ptr [edx], bl
        xor eax, B1E56B83h
        das
        inc ebx
        mov es, bp
        test al, 9Eh
        push ss
        add al, B3h
        call far 2631h : D68942F0h
        inc edx
        dec esp
        mov eax, 79EDC0D1h
        push eax
        xor dl, byte ptr [ecx+33AD4F3Ah]
        cdq
        iretw
        adc dword ptr [edi+00AA000Ch], esi
        pushad
        rcl dword ptr [ebx+00000000h], cl
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        or byte ptr [eax+eax], al
        add byte ptr [ebx+00h], cl
        add byte ptr [eax], al
        add byte ptr [edi], al
        add byte ptr [ecx+62h], dh
        insb
        imul esi, dword ptr [ecx+00h], 000B010Dh
        jnbe 00007F5CC09662FAh
        jc 00007F5CC09662F8h
        je 00007F5CC0966301h

        Data Directories

        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x245a40x28.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x270000x8ac0.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
        IMAGE_DIRECTORY_ENTRY_IAT0x10000x144.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

        Sections

        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x23b040x24000False0.399773491753data5.92220108342IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .data0x250000x1a240x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .rsrc0x270000x8ac00x9000False0.329942491319data4.39398480347IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

        Resources

        NameRVASizeTypeLanguageCountry
        RT_ICON0x2f2180x8a8data
        RT_ICON0x2aff00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 0, next used block 0
        RT_ICON0x28a480x25a8data
        RT_ICON0x279a00x10a8data
        RT_ICON0x275380x468GLS_BINARY_LSB_FIRST
        RT_GROUP_ICON0x274ec0x4cdata
        RT_VERSION0x271b00x33cdataKazakhKazakhstan

        Imports

        DLLImport
        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaVarForInit, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaAryCopy, _allmul, _CItan, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

        Version Infos

        DescriptionData
        Translation0x043f 0x04b0
        LegalCopyright@P.I.C Program
        InternalNameImpennate7
        FileVersion7.00
        CompanyName@Broadcom@
        LegalTrademarks@P.I.C Program
        Comments@P.I.C Program
        ProductName@P.I.C Program
        ProductVersion7.00
        FileDescription@P.I.C Program
        OriginalFilenameImpennate7.exe

        Possible Origin

        Language of compilation systemCountry where language is spokenMap
        KazakhKazakhstan

        Network Behavior

        Snort IDS Alerts

        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        07/22/21-10:45:13.302249ICMP399ICMP Destination Unreachable Host Unreachable186.169.69.166192.168.2.3
        07/22/21-10:45:44.235836ICMP399ICMP Destination Unreachable Host Unreachable186.169.69.166192.168.2.3

        Network Port Distribution

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Jul 22, 2021 10:45:09.966116905 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.156882048 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.157150030 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.185319901 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.376385927 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376420021 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376436949 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376451969 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.376671076 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.378618956 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.378905058 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.509068012 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.699985981 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.700149059 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.717775106 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.914993048 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915028095 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915045023 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915060043 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915080070 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915102959 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915141106 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915144920 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915163040 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915163040 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915183067 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915195942 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915205002 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:10.915226936 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:10.915251017 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.105845928 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.105910063 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.105947018 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.105963945 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.105966091 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.105999947 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106010914 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106046915 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106066942 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106101990 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106205940 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106257915 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106267929 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106309891 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106308937 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106343985 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106368065 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106403112 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106408119 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106445074 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106450081 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106482983 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106484890 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106533051 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.106539011 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.106575012 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297169924 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297302008 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297312021 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297343016 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297368050 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297369957 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297404051 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297425985 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297425985 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297449112 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297472954 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297481060 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297499895 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297518015 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297524929 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297548056 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297555923 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297573090 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297596931 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297597885 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297621012 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297621012 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297646999 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297662973 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297671080 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297698975 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297703028 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297724962 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297734022 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297749996 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297759056 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297774076 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297795057 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297796965 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297821045 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297833920 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297846079 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297868967 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297869921 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297897100 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297902107 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297923088 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.297944069 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.297972918 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.488461018 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488518000 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488555908 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488595009 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488632917 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488662004 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.488686085 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488714933 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.488729954 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488764048 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.488775969 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488830090 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488847017 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.488883972 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488915920 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.488938093 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.488993883 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489008904 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489051104 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489053965 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489119053 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489125967 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489175081 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489216089 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489227057 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489254951 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489276886 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489303112 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489346981 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489361048 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489398956 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489439964 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489444971 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489497900 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489532948 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489542007 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489584923 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489589930 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489640951 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489660025 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489671946 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489722967 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489739895 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489764929 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489808083 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489808083 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489866018 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489893913 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.489907026 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.489955902 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490001917 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.490015984 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490050077 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.490067959 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490118027 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490134954 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.490169048 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490212917 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.490214109 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490257978 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490293026 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490303040 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.490335941 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490387917 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.490396976 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.490444899 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.490519047 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.682394028 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682424068 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682585955 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.682710886 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682729006 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682744026 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682756901 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682769060 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682785988 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682801008 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682823896 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682846069 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682854891 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.682862043 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682867050 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.682883024 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682898998 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.682904005 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682915926 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.682921886 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682941914 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682949066 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.682969093 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.682987928 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683000088 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683008909 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683023930 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683032036 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683052063 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683064938 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683070898 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683092117 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683101892 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683110952 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683140993 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683145046 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683165073 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683170080 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683187008 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683202982 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683207989 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683231115 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683240891 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683252096 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683271885 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683288097 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683291912 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683310986 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683320999 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683332920 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683341980 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683351040 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683371067 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683386087 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683396101 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683413982 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683418989 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683430910 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683444977 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683456898 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683468103 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683489084 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683505058 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683511019 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683538914 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683543921 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683562040 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683573961 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683588028 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683608055 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683609962 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683620930 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683635950 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683638096 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683659077 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683666945 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683680058 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683701992 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683706999 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683723927 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683729887 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683749914 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683768034 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683774948 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683795929 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683806896 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683816910 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683842897 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683844090 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683865070 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683880091 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683888912 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683904886 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683917046 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683928013 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683953047 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683954954 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.683978081 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.683990955 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.684000969 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.684016943 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.684022903 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.684051037 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.684092999 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.873121023 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.873155117 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.873342037 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874443054 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874473095 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874495029 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874521971 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874543905 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874566078 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874583006 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874587059 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874609947 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874620914 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874631882 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874645948 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874655008 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874670029 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874677896 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874702930 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874726057 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874737978 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874749899 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874773026 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874779940 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874795914 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.874806881 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874855995 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.874999046 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875021935 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875046968 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875068903 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875091076 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875102997 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875125885 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875147104 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875153065 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875153065 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875179052 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875200987 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875205040 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875224113 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875241041 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875246048 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875257969 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875288010 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875341892 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875364065 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875389099 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875411987 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875416040 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875433922 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875457048 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875464916 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875478983 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875499010 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875507116 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875521898 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875544071 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875547886 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875566959 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875588894 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875591040 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875611067 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875614882 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875633001 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875641108 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875655890 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875675917 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875680923 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875705004 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875708103 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875726938 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875746012 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875749111 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875780106 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875790119 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875801086 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875824928 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875839949 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875845909 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875857115 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875870943 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875894070 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875895977 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875916004 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875937939 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875941038 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.875961065 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875981092 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.875981092 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876004934 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876015902 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876034021 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876044035 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876059055 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876081944 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876084089 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876104116 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876127005 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876133919 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876148939 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876166105 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876171112 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876194000 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876205921 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876215935 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876235962 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876243114 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876266003 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876281977 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876287937 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876310110 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876327038 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876332045 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876353979 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876364946 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876375914 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876398087 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876399040 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876422882 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876441956 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876446009 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876470089 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876492023 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876496077 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876514912 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876518011 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876537085 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876550913 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876559019 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876580954 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876605988 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876610041 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876630068 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876641035 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876652002 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876669884 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876673937 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876697063 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876718044 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876719952 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876738071 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876746893 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876760006 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876777887 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876796007 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876796007 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876813889 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876831055 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876837969 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876863956 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876877069 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876885891 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876900911 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876915932 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876920938 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876943111 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876946926 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.876961946 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876986027 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.876991034 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.877010107 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.877018929 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.877048016 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:11.877048969 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.877082109 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:11.877099037 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.066399097 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.066469908 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.066632986 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067157030 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067224979 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067286015 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067336082 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067341089 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067363024 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067384005 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067403078 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067437887 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067441940 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067497015 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067553043 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067554951 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067609072 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067665100 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067673922 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067735910 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067780972 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067785978 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067819118 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067826033 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067856073 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067869902 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067894936 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067898989 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067933083 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.067943096 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.067971945 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068030119 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068036079 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068080902 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068116903 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068129063 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068156004 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068192005 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068222046 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068228006 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068255901 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068264961 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068276882 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068303108 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068319082 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068346024 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068351984 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068393946 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068397999 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068429947 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068434954 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068469048 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068479061 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068506956 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068542957 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068557024 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068583965 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068583965 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068620920 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068630934 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068662882 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068666935 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068708897 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068744898 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068759918 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068783045 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068797112 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068820000 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068830967 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068855047 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068892002 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.068908930 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.068938017 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.069266081 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069327116 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069327116 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.069372892 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069425106 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.069428921 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069487095 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069541931 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.069544077 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069602013 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069653988 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.069658041 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069722891 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069778919 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.069782019 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069838047 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069895029 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.069897890 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.069956064 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070015907 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070023060 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070055962 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070059061 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070092916 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070103884 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070130110 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070166111 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070180893 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070202112 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070209026 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070250034 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070291042 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070297003 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070327044 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070364952 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070378065 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070401907 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070419073 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070437908 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070444107 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070476055 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070482969 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070513010 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070532084 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070557117 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070560932 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070601940 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070640087 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070652008 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070677042 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070691109 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070714951 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070719004 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070749998 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070787907 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070800066 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070825100 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070835114 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070872068 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070914030 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070924997 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070950985 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.070960999 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.070991039 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071017981 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071031094 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071069002 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071110964 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071180105 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071198940 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071201086 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071239948 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071286917 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071290016 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071330070 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071367025 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071386099 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071422100 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071445942 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071460009 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071460962 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071495056 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071508884 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071538925 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.071541071 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071580887 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:12.071584940 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.072047949 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:12.839066029 CEST497532508192.168.2.3186.169.69.166
        Jul 22, 2021 10:45:15.843580961 CEST497532508192.168.2.3186.169.69.166
        Jul 22, 2021 10:45:21.852430105 CEST497532508192.168.2.3186.169.69.166
        Jul 22, 2021 10:45:27.069648027 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:27.069674969 CEST44349752198.54.115.48192.168.2.3
        Jul 22, 2021 10:45:27.069755077 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:27.069788933 CEST49752443192.168.2.3198.54.115.48
        Jul 22, 2021 10:45:34.995014906 CEST497542508192.168.2.3186.169.69.166
        Jul 22, 2021 10:45:37.999269009 CEST497542508192.168.2.3186.169.69.166
        Jul 22, 2021 10:45:44.005176067 CEST497542508192.168.2.3186.169.69.166

        UDP Packets

        TimestampSource PortDest PortSource IPDest IP
        Jul 22, 2021 10:41:28.855549097 CEST5754453192.168.2.38.8.8.8
        Jul 22, 2021 10:41:28.913228035 CEST53575448.8.8.8192.168.2.3
        Jul 22, 2021 10:41:29.627794027 CEST5598453192.168.2.38.8.8.8
        Jul 22, 2021 10:41:29.681444883 CEST53559848.8.8.8192.168.2.3
        Jul 22, 2021 10:41:30.439649105 CEST6418553192.168.2.38.8.8.8
        Jul 22, 2021 10:41:30.491682053 CEST53641858.8.8.8192.168.2.3
        Jul 22, 2021 10:41:30.696984053 CEST6511053192.168.2.38.8.8.8
        Jul 22, 2021 10:41:30.756556034 CEST53651108.8.8.8192.168.2.3
        Jul 22, 2021 10:41:32.226253033 CEST5836153192.168.2.38.8.8.8
        Jul 22, 2021 10:41:32.286098003 CEST53583618.8.8.8192.168.2.3
        Jul 22, 2021 10:41:33.432280064 CEST6349253192.168.2.38.8.8.8
        Jul 22, 2021 10:41:33.485963106 CEST53634928.8.8.8192.168.2.3
        Jul 22, 2021 10:41:34.687273979 CEST6083153192.168.2.38.8.8.8
        Jul 22, 2021 10:41:34.738322973 CEST53608318.8.8.8192.168.2.3
        Jul 22, 2021 10:41:35.702337027 CEST6010053192.168.2.38.8.8.8
        Jul 22, 2021 10:41:35.753923893 CEST53601008.8.8.8192.168.2.3
        Jul 22, 2021 10:41:36.631591082 CEST5319553192.168.2.38.8.8.8
        Jul 22, 2021 10:41:36.680809975 CEST53531958.8.8.8192.168.2.3
        Jul 22, 2021 10:41:39.727713108 CEST5014153192.168.2.38.8.8.8
        Jul 22, 2021 10:41:39.777374029 CEST53501418.8.8.8192.168.2.3
        Jul 22, 2021 10:41:40.709177017 CEST5302353192.168.2.38.8.8.8
        Jul 22, 2021 10:41:40.762366056 CEST53530238.8.8.8192.168.2.3
        Jul 22, 2021 10:41:41.704982042 CEST4956353192.168.2.38.8.8.8
        Jul 22, 2021 10:41:41.757411003 CEST53495638.8.8.8192.168.2.3
        Jul 22, 2021 10:41:42.597750902 CEST5135253192.168.2.38.8.8.8
        Jul 22, 2021 10:41:42.658118963 CEST53513528.8.8.8192.168.2.3
        Jul 22, 2021 10:41:46.766100883 CEST5934953192.168.2.38.8.8.8
        Jul 22, 2021 10:41:46.819855928 CEST53593498.8.8.8192.168.2.3
        Jul 22, 2021 10:41:48.145740032 CEST5708453192.168.2.38.8.8.8
        Jul 22, 2021 10:41:48.198137999 CEST53570848.8.8.8192.168.2.3
        Jul 22, 2021 10:41:49.517611980 CEST5882353192.168.2.38.8.8.8
        Jul 22, 2021 10:41:49.569657087 CEST53588238.8.8.8192.168.2.3
        Jul 22, 2021 10:41:56.434962988 CEST5756853192.168.2.38.8.8.8
        Jul 22, 2021 10:41:56.487602949 CEST53575688.8.8.8192.168.2.3
        Jul 22, 2021 10:41:57.219800949 CEST5054053192.168.2.38.8.8.8
        Jul 22, 2021 10:41:57.270225048 CEST53505408.8.8.8192.168.2.3
        Jul 22, 2021 10:41:59.087013960 CEST5436653192.168.2.38.8.8.8
        Jul 22, 2021 10:41:59.136548042 CEST53543668.8.8.8192.168.2.3
        Jul 22, 2021 10:42:05.132457018 CEST5303453192.168.2.38.8.8.8
        Jul 22, 2021 10:42:05.190510988 CEST53530348.8.8.8192.168.2.3
        Jul 22, 2021 10:42:05.638375044 CEST5776253192.168.2.38.8.8.8
        Jul 22, 2021 10:42:05.697576046 CEST53577628.8.8.8192.168.2.3
        Jul 22, 2021 10:42:22.473356009 CEST5543553192.168.2.38.8.8.8
        Jul 22, 2021 10:42:22.533193111 CEST53554358.8.8.8192.168.2.3
        Jul 22, 2021 10:42:24.855288982 CEST5071353192.168.2.38.8.8.8
        Jul 22, 2021 10:42:24.914053917 CEST53507138.8.8.8192.168.2.3
        Jul 22, 2021 10:42:36.374967098 CEST5613253192.168.2.38.8.8.8
        Jul 22, 2021 10:42:36.452851057 CEST53561328.8.8.8192.168.2.3
        Jul 22, 2021 10:42:37.046250105 CEST5898753192.168.2.38.8.8.8
        Jul 22, 2021 10:42:37.104217052 CEST53589878.8.8.8192.168.2.3
        Jul 22, 2021 10:43:08.455636978 CEST5657953192.168.2.38.8.8.8
        Jul 22, 2021 10:43:08.523492098 CEST53565798.8.8.8192.168.2.3
        Jul 22, 2021 10:43:09.006038904 CEST6063353192.168.2.38.8.8.8
        Jul 22, 2021 10:43:09.074167013 CEST53606338.8.8.8192.168.2.3
        Jul 22, 2021 10:43:25.719934940 CEST6129253192.168.2.38.8.8.8
        Jul 22, 2021 10:43:25.792639017 CEST53612928.8.8.8192.168.2.3
        Jul 22, 2021 10:44:23.550378084 CEST6361953192.168.2.38.8.8.8
        Jul 22, 2021 10:44:23.641876936 CEST53636198.8.8.8192.168.2.3
        Jul 22, 2021 10:44:25.413438082 CEST6493853192.168.2.38.8.8.8
        Jul 22, 2021 10:44:25.543364048 CEST53649388.8.8.8192.168.2.3
        Jul 22, 2021 10:44:26.391135931 CEST6194653192.168.2.38.8.8.8
        Jul 22, 2021 10:44:26.450129032 CEST53619468.8.8.8192.168.2.3
        Jul 22, 2021 10:44:26.938622952 CEST6491053192.168.2.38.8.8.8
        Jul 22, 2021 10:44:26.998559952 CEST53649108.8.8.8192.168.2.3
        Jul 22, 2021 10:44:27.642832994 CEST5212353192.168.2.38.8.8.8
        Jul 22, 2021 10:44:27.702327967 CEST53521238.8.8.8192.168.2.3
        Jul 22, 2021 10:44:28.215982914 CEST5613053192.168.2.38.8.8.8
        Jul 22, 2021 10:44:28.274662018 CEST53561308.8.8.8192.168.2.3
        Jul 22, 2021 10:44:28.861097097 CEST5633853192.168.2.38.8.8.8
        Jul 22, 2021 10:44:28.913039923 CEST53563388.8.8.8192.168.2.3
        Jul 22, 2021 10:44:29.772561073 CEST5942053192.168.2.38.8.8.8
        Jul 22, 2021 10:44:29.832505941 CEST53594208.8.8.8192.168.2.3
        Jul 22, 2021 10:44:30.739958048 CEST5878453192.168.2.38.8.8.8
        Jul 22, 2021 10:44:30.797008991 CEST53587848.8.8.8192.168.2.3
        Jul 22, 2021 10:44:31.252382040 CEST6397853192.168.2.38.8.8.8
        Jul 22, 2021 10:44:31.315813065 CEST53639788.8.8.8192.168.2.3
        Jul 22, 2021 10:45:09.855098009 CEST6293853192.168.2.38.8.8.8
        Jul 22, 2021 10:45:09.919981956 CEST53629388.8.8.8192.168.2.3
        Jul 22, 2021 10:45:12.766573906 CEST5570853192.168.2.38.8.8.8
        Jul 22, 2021 10:45:12.826633930 CEST53557088.8.8.8192.168.2.3
        Jul 22, 2021 10:45:34.928658009 CEST5680353192.168.2.38.8.8.8
        Jul 22, 2021 10:45:34.986488104 CEST53568038.8.8.8192.168.2.3

        ICMP Packets

        TimestampSource IPDest IPChecksumCodeType
        Jul 22, 2021 10:45:13.302248955 CEST186.169.69.166192.168.2.3c020(Host unreachable)Destination Unreachable
        Jul 22, 2021 10:45:44.235836029 CEST186.169.69.166192.168.2.3c020(Host unreachable)Destination Unreachable

        DNS Queries

        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Jul 22, 2021 10:45:09.855098009 CEST192.168.2.38.8.8.80x18f2Standard query (0)smokeadmsend.onlineA (IP address)IN (0x0001)
        Jul 22, 2021 10:45:12.766573906 CEST192.168.2.38.8.8.80xfec1Standard query (0)databasepropersonombrecomercialideasearchwords.servicesA (IP address)IN (0x0001)
        Jul 22, 2021 10:45:34.928658009 CEST192.168.2.38.8.8.80xf13Standard query (0)databasepropersonombrecomercialideasearchwords.servicesA (IP address)IN (0x0001)

        DNS Answers

        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Jul 22, 2021 10:45:09.919981956 CEST8.8.8.8192.168.2.30x18f2No error (0)smokeadmsend.online198.54.115.48A (IP address)IN (0x0001)
        Jul 22, 2021 10:45:12.826633930 CEST8.8.8.8192.168.2.30xfec1No error (0)databasepropersonombrecomercialideasearchwords.services186.169.69.166A (IP address)IN (0x0001)
        Jul 22, 2021 10:45:34.986488104 CEST8.8.8.8192.168.2.30xf13No error (0)databasepropersonombrecomercialideasearchwords.services186.169.69.166A (IP address)IN (0x0001)

        HTTPS Packets

        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
        Jul 22, 2021 10:45:10.378618956 CEST198.54.115.48443192.168.2.349752CN=smokeadmsend.online CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jun 17 02:00:00 CEST 2021 Fri Nov 02 01:00:00 CET 2018 Tue Mar 12 01:00:00 CET 2019Sat Jun 18 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2031 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
        CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031
        CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Mar 12 01:00:00 CET 2019Mon Jan 01 00:59:59 CET 2029

        Code Manipulations

        Statistics

        CPU Usage

        Click to jump to process

        Memory Usage

        Click to jump to process

        High Level Behavior Distribution

        Click to dive into process behavior distribution

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:10:41:34
        Start date:22/07/2021
        Path:C:\Users\user\Desktop\41609787.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\41609787.exe'
        Imagebase:0x400000
        File size:192512 bytes
        MD5 hash:242FB5498503FDAE24861CA26F762745
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Author: Joe Security
        Reputation:low

        General

        Start time:10:44:29
        Start date:22/07/2021
        Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\41609787.exe'
        Imagebase:0xbb0000
        File size:480256 bytes
        MD5 hash:DAD17AB737E680C47C8A44CBB95EE67E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001B.00000002.726106922.00000000032B5000.00000004.00000020.sdmp, Author: Joe Security
        Reputation:moderate

        General

        Start time:10:45:11
        Start date:22/07/2021
        Path:C:\Windows\SysWOW64\cmd.exe
        Wow64 process (32bit):true
        Commandline:/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        Imagebase:0xbd0000
        File size:232960 bytes
        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:10:45:12
        Start date:22/07/2021
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6b2800000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:10:45:12
        Start date:22/07/2021
        Path:C:\Windows\SysWOW64\reg.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        Imagebase:0x1380000
        File size:59392 bytes
        MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Disassembly

        Code Analysis

        Reset < >

          Execution Graph

          Execution Coverage:1.9%
          Dynamic/Decrypted Code Coverage:60.8%
          Signature Coverage:49.6%
          Total number of Nodes:339
          Total number of Limit Nodes:63

          Graph

          execution_graph 48468 4014f0 #100 48469 40152e 48468->48469 48470 21084d1 48471 2108480 48470->48471 48472 2100e30 48471->48472 48483 210854a 48471->48483 48511 210ce70 48472->48511 48474 21089f5 48476 211079c 2 API calls 48474->48476 48475 2100e8e 48477 2100f61 48475->48477 48479 2108ae4 48475->48479 48478 2108a4b 48476->48478 48523 211079c 48477->48523 48480 211079c 2 API calls 48478->48480 48488 210d0f5 LoadLibraryA 48479->48488 48490 2100dcb 48479->48490 48525 210d822 GetPEB 48479->48525 48482 2108a5f 48480->48482 48485 211079c 2 API calls 48482->48485 48483->48474 48486 21086b8 NtWriteVirtualMemory 48483->48486 48484 2100fed 48487 210ce70 LoadLibraryA GetPEB 48484->48487 48485->48479 48494 21086f0 48486->48494 48507 210103c 48487->48507 48489 210d0ff 48488->48489 48492 210cfa8 48492->48490 48493 210d822 GetPEB 48492->48493 48496 210d09f 48492->48496 48497 210cffa 48493->48497 48494->48474 48495 211079c 2 API calls 48494->48495 48498 21087cb 48495->48498 48496->48488 48497->48496 48499 210d822 GetPEB 48497->48499 48498->48474 48500 211079c 2 API calls 48498->48500 48499->48496 48501 21088c8 48500->48501 48501->48474 48502 2108907 48501->48502 48503 211079c 2 API calls 48502->48503 48504 2108974 48503->48504 48505 211079c 2 API calls 48504->48505 48506 21089f2 48505->48506 48508 21070f2 48507->48508 48509 2100ba0 LoadLibraryA GetPEB 48507->48509 48510 210ab06 48509->48510 48512 210ce99 48511->48512 48513 2100dcb 48511->48513 48512->48511 48514 211144d 48512->48514 48515 210d0f5 LoadLibraryA 48512->48515 48517 210d822 GetPEB 48512->48517 48513->48475 48514->48475 48516 210d0ff 48515->48516 48516->48475 48518 210cfa8 48517->48518 48518->48514 48519 210d822 GetPEB 48518->48519 48520 210d09f 48518->48520 48521 210cffa 48519->48521 48520->48515 48521->48520 48522 210d822 GetPEB 48521->48522 48522->48520 48527 21107a1 48523->48527 48526 210d872 48525->48526 48526->48492 48528 21107ac 48527->48528 48533 210dbb4 48528->48533 48530 211114c 48531 2110a04 48531->48530 48532 2111133 NtSetInformationThread 48531->48532 48532->48530 48534 210dbfb 48533->48534 48535 210d822 GetPEB 48534->48535 48536 210dc03 48535->48536 48536->48531 48537 4218f0 48538 421933 48537->48538 48539 4219d7 __vbaNew2 48538->48539 48540 4219ec __vbaObjSet 48538->48540 48539->48540 48542 421a12 48540->48542 48543 421a2a #561 __vbaFreeObj __vbaFreeVar 48542->48543 48544 421a18 __vbaHresultCheckObj 48542->48544 48545 421b69 48543->48545 48546 421a79 48543->48546 48544->48543 48547 421b72 __vbaNew2 48545->48547 48548 421b87 __vbaObjSet 48545->48548 48549 421ab0 __vbaNew2 48546->48549 48550 421ac5 __vbaObjSet 48546->48550 48547->48548 48553 421ba6 48548->48553 48549->48550 48554 421ae8 48550->48554 48555 421bbe __vbaFreeObj 48553->48555 48556 421bac __vbaHresultCheckObj 48553->48556 48557 421b00 #595 __vbaFreeObj __vbaFreeVarList 48554->48557 48558 421aee __vbaHresultCheckObj 48554->48558 48559 421bd0 __vbaNew2 48555->48559 48560 421be5 __vbaObjSet 48555->48560 48556->48555 48557->48545 48558->48557 48559->48560 48562 421c08 48560->48562 48563 421c0e __vbaHresultCheckObj 48562->48563 48564 421c1d 48562->48564 48563->48564 48565 421c26 __vbaNew2 48564->48565 48566 421c3b __vbaObjSet 48564->48566 48565->48566 48568 421c61 48566->48568 48569 421c67 __vbaHresultCheckObj 48568->48569 48570 421c79 48568->48570 48569->48570 48571 421c82 __vbaNew2 48570->48571 48572 421c97 __vbaObjSet 48570->48572 48571->48572 48574 421cba 48572->48574 48575 421cd2 48574->48575 48576 421cc0 __vbaHresultCheckObj 48574->48576 48577 421d13 __vbaHresultCheckObj 48575->48577 48578 421d25 __vbaFreeStr __vbaFreeObjList 48575->48578 48576->48575 48577->48578 48579 421d63 __vbaObjSet 48578->48579 48580 421d4e __vbaNew2 48578->48580 48582 421d89 48579->48582 48580->48579 48583 421da1 __vbaFreeObj 48582->48583 48584 421d8f __vbaHresultCheckObj 48582->48584 48586 421dd4 __vbaNew2 48583->48586 48587 421de9 __vbaObjSet 48583->48587 48584->48583 48586->48587 48589 421e0c 48587->48589 48590 421e12 __vbaHresultCheckObj 48589->48590 48591 421e24 __vbaLateIdCallLd __vbaStrVarMove __vbaStrMove 48589->48591 48590->48591 48592 421e8a __vbaFreeStr __vbaFreeObjList __vbaFreeVar 48591->48592 48593 421ed0 __vbaObjSet 48592->48593 48594 421ebb __vbaNew2 48592->48594 48596 421ef3 48593->48596 48594->48593 48597 421f0b __vbaStrCopy __vbaStrMove 48596->48597 48598 421ef9 __vbaHresultCheckObj 48596->48598 48599 421f6f __vbaFreeStrList __vbaFreeObj 48597->48599 48598->48597 48600 421f94 __vbaNew2 48599->48600 48601 421fa9 __vbaObjSet 48599->48601 48600->48601 48603 421fc9 48601->48603 48604 421fe2 48603->48604 48605 421fcf __vbaHresultCheckObj 48603->48605 48606 421fe8 __vbaStrCopy 48604->48606 48605->48606 48764 423450 48606->48764 48607 42204e 48608 422052 __vbaHresultCheckObj 48607->48608 48609 422060 __vbaFreeStrList __vbaFreeObj 48607->48609 48608->48609 48610 422085 48609->48610 48611 4220a7 48610->48611 48612 422099 __vbaHresultCheckObj 48610->48612 48613 4220b0 __vbaNew2 48611->48613 48614 4220c5 __vbaObjSet 48611->48614 48612->48611 48613->48614 48616 4220e5 48614->48616 48617 4220f6 48616->48617 48618 4220eb __vbaHresultCheckObj 48616->48618 48619 422114 __vbaObjSet 48617->48619 48620 4220ff __vbaNew2 48617->48620 48618->48617 48622 42213a 48619->48622 48620->48619 48623 422140 __vbaHresultCheckObj 48622->48623 48624 42214e __vbaFreeStr __vbaFreeObjList 48622->48624 48623->48624 48626 4221bf 48624->48626 48627 4221c3 __vbaHresultCheckObj 48626->48627 48628 4221d1 48626->48628 48627->48628 48629 4221da __vbaNew2 48628->48629 48630 4221ef __vbaObjSet 48628->48630 48629->48630 48632 422215 48630->48632 48633 42221b __vbaHresultCheckObj 48632->48633 48634 422229 __vbaStrCopy 48632->48634 48633->48634 48635 422250 __vbaFreeStr __vbaFreeObj 48634->48635 48636 422280 __vbaObjSet 48635->48636 48637 42226b __vbaNew2 48635->48637 48639 4222a3 48636->48639 48637->48636 48640 4222b4 48639->48640 48641 4222a9 __vbaHresultCheckObj 48639->48641 48642 4222d2 __vbaObjSet 48640->48642 48643 4222bd __vbaNew2 48640->48643 48641->48640 48645 4222f5 48642->48645 48643->48642 48646 4222fb __vbaHresultCheckObj 48645->48646 48647 422309 __vbaStrCopy 48645->48647 48646->48647 48648 422356 __vbaFreeStrList __vbaFreeObjList 48647->48648 48649 4223ae 48648->48649 48650 4223b7 __vbaNew2 48649->48650 48651 4223cc __vbaObjSet 48649->48651 48650->48651 48653 4223f2 48651->48653 48654 422406 48653->48654 48655 4223f8 __vbaHresultCheckObj 48653->48655 48656 422463 __vbaFreeObj 48654->48656 48657 422455 __vbaHresultCheckObj 48654->48657 48655->48654 48767 423dd0 48656->48767 48657->48656 48659 4224af __vbaHresultCheckObj 48660 4224bd __vbaStrCopy 48659->48660 48661 42250e __vbaFreeStr __vbaVarForInit 48660->48661 48712 42257d 48661->48712 48662 42286c __vbaHresultCheckObj 48770 403cb0 48662->48770 48663 42258e __vbaNew2 48663->48712 48665 4225ac __vbaObjSet 48665->48712 48670 4225da __vbaLateIdCallLd __vbaStrCopy __vbaI4Var 48673 422642 __vbaFreeStr __vbaFreeObjList __vbaFreeVar 48670->48673 48671 4225cc __vbaHresultCheckObj 48671->48670 48705 422673 48673->48705 48679 422677 __vbaHresultCheckObj 48679->48705 48685 422697 __vbaNew2 48685->48705 48688 4226b5 __vbaObjSet 48688->48705 48696 4226d5 __vbaHresultCheckObj 48696->48705 48697 4226e9 __vbaNew2 48697->48705 48699 422707 __vbaObjSet 48699->48705 48705->48679 48705->48685 48705->48688 48705->48696 48705->48697 48705->48699 48706 422727 __vbaHresultCheckObj 48705->48706 48707 422735 __vbaLateIdCallLd __vbaI4Var 48705->48707 48706->48707 48709 42279e __vbaFreeObjList __vbaFreeVar 48707->48709 48711 4227ca __vbaNew2 48709->48711 48709->48712 48711->48712 48712->48662 48712->48663 48712->48665 48712->48670 48712->48671 48715 4227e8 __vbaObjSet 48712->48715 48720 422805 __vbaHresultCheckObj 48712->48720 48722 42283d __vbaFreeStr __vbaFreeObj __vbaVarForNext 48712->48722 48715->48712 48720->48712 48722->48712 48765 423487 __vbaStrCopy #705 __vbaStrMove __vbaFreeVar 48764->48765 48766 4234ef __vbaFreeStr __vbaFreeStr 48765->48766 48766->48607 48768 423e09 #690 48767->48768 48769 4224ab 48768->48769 48769->48659 48769->48660 48771 2101715 48772 21016c4 48771->48772 48777 2101718 48771->48777 48773 21016f3 48772->48773 48793 2101437 48772->48793 48774 21016fc 48773->48774 48872 210943a GetPEB 48773->48872 48776 210ce70 2 API calls 48774->48776 48781 2101766 48774->48781 48776->48781 48777->48774 48779 2101736 48777->48779 48780 210175f 48777->48780 48777->48793 48784 21016f4 48779->48784 48779->48793 48782 210ce70 2 API calls 48780->48782 48783 211079c 2 API calls 48781->48783 48782->48781 48786 2101880 48783->48786 48784->48774 48784->48781 48873 210943a GetPEB 48784->48873 48787 2101e9a 48786->48787 48789 210ce70 2 API calls 48786->48789 48790 21070f2 48786->48790 48788 210ce70 2 API calls 48787->48788 48787->48790 48791 2101eba 48788->48791 48799 2101932 48789->48799 48792 210ce70 2 API calls 48791->48792 48800 2101f10 48792->48800 48793->48774 48794 210ea96 48793->48794 48874 210943a GetPEB 48793->48874 48795 210d822 GetPEB 48794->48795 48796 210eaa0 48795->48796 48833 210eb03 48796->48833 48798 210eb00 48802 211079c 2 API calls 48799->48802 48801 211079c 2 API calls 48800->48801 48803 210211e 48801->48803 48806 2101b80 48802->48806 48803->48794 48804 2102131 48803->48804 48805 21021a7 48804->48805 48822 2102230 48804->48822 48808 2109422 TerminateProcess 48805->48808 48806->48787 48806->48794 48807 2100e30 48806->48807 48809 210ce70 2 API calls 48807->48809 48810 2100e8e 48809->48810 48811 2100f61 48810->48811 48814 210ce70 48810->48814 48812 211079c 2 API calls 48811->48812 48813 2100fed 48812->48813 48815 210ce70 2 API calls 48813->48815 48816 210d0f5 LoadLibraryA 48814->48816 48818 2100dcb 48814->48818 48819 210d822 GetPEB 48814->48819 48831 210103c 48815->48831 48817 210d0ff 48816->48817 48820 210cfa8 48819->48820 48820->48818 48821 210d822 GetPEB 48820->48821 48824 210d09f 48820->48824 48826 210cffa 48821->48826 48822->48818 48875 2102c12 GetPEB NtSetInformationThread 48822->48875 48824->48816 48825 21025b2 48876 2100dcb GetPEB NtSetInformationThread 48825->48876 48826->48824 48829 210d822 GetPEB 48826->48829 48828 2102676 48877 2100dcb GetPEB NtSetInformationThread 48828->48877 48829->48824 48831->48790 48878 2100ba0 LoadLibraryA GetPEB 48831->48878 48834 210eb09 48833->48834 48834->48798 48835 210ce70 2 API calls 48834->48835 48836 210ed44 48834->48836 48837 210eec3 48835->48837 48836->48798 48838 210ce70 2 API calls 48837->48838 48839 210ef98 48838->48839 48840 210f029 GetPEB 48839->48840 48841 210f059 48840->48841 48843 2100e30 48840->48843 48880 2110176 48841->48880 48844 210ce70 2 API calls 48843->48844 48845 2100e8e 48844->48845 48846 2100f61 48845->48846 48849 210ce70 48845->48849 48847 211079c 2 API calls 48846->48847 48848 2100fed 48847->48848 48851 210ce70 2 API calls 48848->48851 48850 2100dcb 48849->48850 48852 210d0f5 LoadLibraryA 48849->48852 48854 210d822 GetPEB 48849->48854 48850->48798 48868 210103c 48851->48868 48853 210d0ff 48852->48853 48853->48798 48855 210cfa8 48854->48855 48855->48850 48859 210d822 GetPEB 48855->48859 48860 210d09f 48855->48860 48856 2110176 NtProtectVirtualMemory 48858 2110173 48856->48858 48857 210f0f2 48857->48850 48862 210ff43 48857->48862 48863 210fc40 48857->48863 48858->48798 48861 210cffa 48859->48861 48860->48852 48861->48860 48864 210d822 GetPEB 48861->48864 48862->48856 48863->48849 48863->48850 48865 210feda 48863->48865 48864->48860 48866 2110176 NtProtectVirtualMemory 48865->48866 48867 210feff 48866->48867 48867->48798 48868->48798 48869 21070f2 48868->48869 48879 2100ba0 LoadLibraryA GetPEB 48868->48879 48869->48798 48871 210ab06 48871->48798 48872->48774 48873->48774 48874->48774 48875->48825 48876->48828 48877->48818 48878->48818 48879->48871 48881 21101f1 48880->48881 48882 21102cd NtProtectVirtualMemory 48881->48882 48883 2100dcb 48881->48883 48882->48857 48883->48857 48884 210a907 48888 210a894 48884->48888 48885 210a87c 48886 210a94b LdrInitializeThunk 48887 210a954 48886->48887 48889 210a948 LdrInitializeThunk 48887->48889 48890 210a96a 48887->48890 48888->48885 48888->48886 48888->48887 48891 210aa52 48890->48891 48894 2100ba0 LoadLibraryA GetPEB 48890->48894 48893 210ab06 48894->48893 48895 2100cfb 48896 2100cb0 EnumWindows 48895->48896 48897 2100d02 48895->48897 48898 2100cbc 48896->48898 48897->48896 48897->48898 48899 210ce70 2 API calls 48898->48899 48908 2100cf4 48898->48908 48900 2100e8e 48899->48900 48901 2100f61 48900->48901 48904 210ce70 48900->48904 48902 211079c 2 API calls 48901->48902 48903 2100fed 48902->48903 48905 210ce70 2 API calls 48903->48905 48906 210d0f5 LoadLibraryA 48904->48906 48904->48908 48909 210d822 GetPEB 48904->48909 48915 210103c 48905->48915 48907 210d0ff 48906->48907 48910 210cfa8 48909->48910 48910->48908 48911 210d822 GetPEB 48910->48911 48912 210d09f 48910->48912 48913 210cffa 48911->48913 48912->48906 48913->48912 48914 210d822 GetPEB 48913->48914 48914->48912 48916 21070f2 48915->48916 48919 2100ba0 LoadLibraryA GetPEB 48915->48919 48918 210ab06 48919->48918 48920 210c18f 48921 210c140 48920->48921 48922 210c17f CreateFileA 48921->48922 48923 210c18b 48921->48923 48922->48923

          Executed Functions

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$F\oR$T5o$Vpul$WfiM$]2V$$c$k $}(iy$Q}$z:w$z:w
          • API String ID: 0-3825205698
          • Opcode ID: 6fd0b034e8457cf72fb67ed6cab52e42c06dde530ebd72f98e442b89ef8dfd8a
          • Instruction ID: e7ce7867680b43eaced81eecb2731d989f5cd73ebacaf2227e67d2780d49f30f
          • Opcode Fuzzy Hash: 6fd0b034e8457cf72fb67ed6cab52e42c06dde530ebd72f98e442b89ef8dfd8a
          • Instruction Fuzzy Hash: 9CF25671A84349DFDB389E388DD47EA7BA2FF85350F56412EDD899B180D3B48981CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 707 210669a-2106749 710 2106691-211171c call 210669a 707->710 711 210674f-21067df call 21114d9 707->711 723 2111722-2111725 710->723 724 2111884-21118a1 710->724 719 21070f2-21071ea 711->719 720 21067e5-21068c4 711->720 730 210ce70-210ce93 720->730 731 21068ca-210695a 720->731 723->724 725 211172b-2111746 call 211144d call 21114d9 723->725 725->724 747 211174c-211178c 725->747 733 210ce99-210ceff 730->733 734 2100dcb-2100e2b call 2100c2c 730->734 740 2106960-2106992 call 21114d9 731->740 741 211144d-2111453 731->741 733->730 744 210cf05-210cf20 733->744 742 2111454-21114ce 741->742 752 21114d0-21114d2 742->752 744->741 748 210cf26-210cf52 744->748 747->724 760 2111792-211179f 747->760 754 210d0f5-210d105 LoadLibraryA call 210d108 748->754 755 210cf58-210cfbf call 210d822 748->755 755->741 767 210cfc5-210cfe3 755->767 760->730 763 21117a5-2111881 760->763 768 210d0a2-210d0f3 call 210d108 767->768 769 210cfe9-210d08e call 210d822 call 210d04b 767->769 768->754 769->768 781 210d090-210d09f call 210d822 769->781 781->768
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$TPh_$WfiM$k $z:w$z:w
          • API String ID: 0-2634905961
          • Opcode ID: dddaf3f00803681326384b3a4a214587ce7f871c39c5eb7c7dc754e6ada785f3
          • Instruction ID: ab8f45bbdc7d432b1497589718b8331698143c73951de46f37e3ea5c1e398076
          • Opcode Fuzzy Hash: dddaf3f00803681326384b3a4a214587ce7f871c39c5eb7c7dc754e6ada785f3
          • Instruction Fuzzy Hash: EF92537164434ADFDB389E38CD957EA7BA2FF45350F52812EDC9A9B290D3704A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 784 2103d32-2103d77 787 21070f2-21071ea 784->787 788 2103d7d-2103d95 call 2103a71 784->788 795 2103d9a-2103df8 788->795 798 211144d-2111453 795->798 799 2103dfe-2103e21 795->799 800 2111454-21114ce 798->800 799->787 801 2103e27-2103e31 799->801 805 21114d0-21114d2 800->805 803 2100e30-2100f5b call 21114d9 call 210ce70 801->803 804 2103e37-2103e40 801->804 823 210ce70-210ce93 803->823 824 2100f61-210105b call 211079c call 210ce70 803->824 806 2103e46-2103f18 call 2104092 804->806 837 2103f23-2103f94 806->837 838 2103f1a-2103f21 806->838 827 210ce99-210ceff 823->827 828 2100dcb-2100e2b call 2100c2c 823->828 862 210105d-21010e8 824->862 827->823 835 210cf05-210cf20 827->835 835->798 841 210cf26-210cf52 835->841 837->806 850 2103f9a-2103fa6 837->850 838->837 845 210d0f5-210d105 LoadLibraryA call 210d108 841->845 846 210cf58-210cfbf call 210d822 841->846 846->798 860 210cfc5-210cfe3 846->860 850->795 854 2103fac-2104014 850->854 854->795 861 210401a-2104089 854->861 863 210d0a2-210d0f3 call 210d108 860->863 864 210cfe9-210d08e call 210d822 call 210d04b 860->864 861->795 868 210408f-2104091 861->868 862->787 877 21010ee-2101259 call 210d463 862->877 863->845 864->863 884 210d090-210d09f call 210d822 864->884 877->862 897 210125f-210aa67 call 2101270 call 210aa51 877->897 884->863 908 210aa68-210aaac call 2100a9f 897->908 923 210aa5c 908->923 924 210aaae 908->924 926 210aa52 923->926 927 210aa5e-210aa63 923->927 924->923 925 210aab0-210aab8 924->925 925->908 930 210aaba-210ab1d call 2100ba0 925->930 926->926 938 210ab20-210ab29 930->938 942 210ab2c 938->942 943 210ab57-210ab5d 942->943 944 210ab2e-210ab35 942->944 949 210ab60-210ab62 943->949 950 210ab38 944->950 952 210ab63-210ab69 949->952 950->952 953 210ab3a-210ab44 950->953 958 210ab6c 952->958 959 210ab46-210ab4d 953->959 960 210ab6f-210ab70 953->960 961 210ab97-210aba1 958->961 962 210ab6e 958->962 968 210ab54-210ab56 959->968 960->938 963 210ab72 960->963 969 210aba3-210aba6 961->969 962->960 963->938 966 210ab74-210ab75 963->966 970 210ab78 966->970 968->943 969->968 973 210aba8-210abae 969->973 970->969 971 210ab7a-210ab7c 970->971 971->942 974 210ab7e 971->974 977 210abaf-210abb0 973->977 974->942 976 210ab80-210ab81 974->976 978 210ab84 976->978 977->949 979 210abb2 977->979 978->977 980 210ab86-210ab88 978->980 979->949 981 210abb4-210abbc 979->981 980->950 982 210ab8a 980->982 981->958 984 210abbe 981->984 982->950 985 210ab8c-210ab95 982->985 984->958 986 210abc0-210abc4 984->986 985->961 987 210abc6-210abc8 986->987 988 210abef-210ac42 call 2109075 986->988 987->970 989 210abca 987->989 996 210ac80-210acd0 call 2108b9d 988->996 989->970 991 210abcc-210abd4 989->991 991->978 995 210abd6 991->995 995->978 997 210abd8-210abee call 210a2c5 995->997 1012 210acd2 996->1012 997->988 1012->996 1013 210acd4-210acd8 1012->1013 1014 210ad03-210ad0e 1013->1014 1015 210acda-210acdb 1013->1015 1016 210ad0f-210ad2c 1014->1016 1017 210acdc-210ace4 1015->1017 1016->1017 1025 210ad2e 1016->1025 1017->1016 1022 210ace6-210acf3 call 2109500 1017->1022 1025->1017 1027 210ad30-210ad40 1025->1027 1031 210ad42-210ad46 1027->1031 1032 210ad6b-210ad71 1027->1032 1035 210ad48-210ad4c 1031->1035 1036 210ad73-210ad76 1032->1036 1037 210ad45-210ad46 1032->1037 1038 210ad77-210ad89 1035->1038 1039 210ad4e-210ad50 1035->1039 1036->1038 1037->1035 1040 210ad00-210ad01 1039->1040 1041 210ad52 1039->1041 1040->1014 1041->1040 1043 210ad54-210ad58 1041->1043
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$`$k $z:w$z:w
          • API String ID: 0-4173191499
          • Opcode ID: 1d450da74ba206c0893d5d5ead7ee0bbb28e266f6d332224a48bd3e57dd9db39
          • Instruction ID: 162df1b6fb09c4ea03200402828d5dfc2b9e7f7a19461344bcc83ae25526a313
          • Opcode Fuzzy Hash: 1d450da74ba206c0893d5d5ead7ee0bbb28e266f6d332224a48bd3e57dd9db39
          • Instruction Fuzzy Hash: 61B27772A84345DFDB389E34CD953EA7BA2FF85350F56422EDD9A9B180D3B04981CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1044 210799f-21079a4 1045 2107954-210795e 1044->1045 1046 21079a6 1044->1046 1047 2107960-2107968 1045->1047 1046->1045 1048 21079a8-21079ac 1046->1048 1049 210796c-2107971 1047->1049 1050 21079d7-21079dc 1048->1050 1051 21079ae-21079b0 1048->1051 1052 2107978-210799c 1049->1052 1053 21079de-2107c1c call 211079c 1050->1053 1051->1047 1054 21079b2 1051->1054 1052->1053 1081 210ce70-210ce93 1053->1081 1082 2107c22-2107c2f 1053->1082 1054->1047 1056 21079b4-21079bc 1054->1056 1056->1049 1060 21079be 1056->1060 1060->1049 1061 21079c0-21079c8 1060->1061 1061->1052 1067 21079ca 1061->1067 1067->1052 1069 21079cc-21079d6 1067->1069 1069->1050 1083 210ce99-210ceff 1081->1083 1084 2100dcb-2100e2b call 2100c2c 1081->1084 1085 21089f5-2108b89 call 211079c * 3 1082->1085 1086 2107c35-2107c97 1082->1086 1083->1081 1092 210cf05-210cf20 1083->1092 1085->1081 1141 2108b8f-2108b90 1085->1141 1086->1084 1098 2107c9d-2107e8a call 211079c 1086->1098 1096 210cf26-210cf52 1092->1096 1097 211144d-2111453 1092->1097 1102 210d0f5-210d105 LoadLibraryA call 210d108 1096->1102 1103 210cf58-210cfbf call 210d822 1096->1103 1100 2111454-21114ce 1097->1100 1098->1085 1145 2107e90-21081cc call 211079c call 21081a4 1098->1145 1113 21114d0-21114d2 1100->1113 1103->1097 1120 210cfc5-210cfe3 1103->1120 1123 210d0a2-210d0f3 call 210d108 1120->1123 1124 210cfe9-210d08e call 210d822 call 210d04b 1120->1124 1123->1102 1124->1123 1146 210d090-210d09f call 210d822 1124->1146 1145->1085 1166 21081d2-2108242 1145->1166 1146->1123 1166->1085 1168 2108248-210828c 1166->1168 1171 2108301-2108371 1168->1171 1172 210828e-21082fb 1168->1172 1171->1085 1178 2108377-2108544 1171->1178 1172->1085 1172->1171 1190 2100e30-2100f5b call 21114d9 call 210ce70 1178->1190 1191 210854a-21085cd call 210d463 1178->1191 1190->1081 1210 2100f61-210105b call 211079c call 210ce70 1190->1210 1191->1085 1205 21085d3-2108717 call 211144d NtWriteVirtualMemory 1191->1205 1205->1085 1228 210871d-210883a call 211079c 1205->1228 1229 210105d-21010e8 1210->1229 1228->1085 1249 2108840-2108901 call 211079c 1228->1249 1238 21070f2-21071ea 1229->1238 1239 21010ee-2101259 call 210d463 1229->1239 1239->1229 1272 210125f-210aa67 call 2101270 call 210aa51 1239->1272 1249->1085 1259 2108907-21089f2 call 211079c * 2 1249->1259 1283 210aa68-210aaac call 2100a9f 1272->1283 1298 210aa5c 1283->1298 1299 210aaae 1283->1299 1301 210aa52 1298->1301 1302 210aa5e-210aa63 1298->1302 1299->1298 1300 210aab0-210aab8 1299->1300 1300->1283 1305 210aaba-210ab1d call 2100ba0 1300->1305 1301->1301 1313 210ab20-210ab29 1305->1313 1317 210ab2c 1313->1317 1318 210ab57-210ab5d 1317->1318 1319 210ab2e-210ab35 1317->1319 1324 210ab60-210ab62 1318->1324 1325 210ab38 1319->1325 1327 210ab63-210ab69 1324->1327 1325->1327 1328 210ab3a-210ab44 1325->1328 1333 210ab6c 1327->1333 1334 210ab46-210ab4d 1328->1334 1335 210ab6f-210ab70 1328->1335 1336 210ab97-210aba1 1333->1336 1337 210ab6e 1333->1337 1343 210ab54-210ab56 1334->1343 1335->1313 1338 210ab72 1335->1338 1344 210aba3-210aba6 1336->1344 1337->1335 1338->1313 1341 210ab74-210ab75 1338->1341 1345 210ab78 1341->1345 1343->1318 1344->1343 1348 210aba8-210abae 1344->1348 1345->1344 1346 210ab7a-210ab7c 1345->1346 1346->1317 1349 210ab7e 1346->1349 1352 210abaf-210abb0 1348->1352 1349->1317 1351 210ab80-210ab81 1349->1351 1353 210ab84 1351->1353 1352->1324 1354 210abb2 1352->1354 1353->1352 1355 210ab86-210ab88 1353->1355 1354->1324 1356 210abb4-210abbc 1354->1356 1355->1325 1357 210ab8a 1355->1357 1356->1333 1359 210abbe 1356->1359 1357->1325 1360 210ab8c-210ab95 1357->1360 1359->1333 1361 210abc0-210abc4 1359->1361 1360->1336 1362 210abc6-210abc8 1361->1362 1363 210abef-210ac42 call 2109075 1361->1363 1362->1345 1364 210abca 1362->1364 1371 210ac80-210acd0 call 2108b9d 1363->1371 1364->1345 1366 210abcc-210abd4 1364->1366 1366->1353 1370 210abd6 1366->1370 1370->1353 1372 210abd8-210abee call 210a2c5 1370->1372 1387 210acd2 1371->1387 1372->1363 1387->1371 1388 210acd4-210acd8 1387->1388 1389 210ad03-210ad0e 1388->1389 1390 210acda-210acdb 1388->1390 1391 210ad0f-210ad2c 1389->1391 1392 210acdc-210ace4 1390->1392 1391->1392 1400 210ad2e 1391->1400 1392->1391 1397 210ace6-210acf3 call 2109500 1392->1397 1400->1392 1402 210ad30-210ad40 1400->1402 1406 210ad42-210ad46 1402->1406 1407 210ad6b-210ad71 1402->1407 1410 210ad48-210ad4c 1406->1410 1411 210ad73-210ad76 1407->1411 1412 210ad45-210ad46 1407->1412 1413 210ad77-210ad89 1410->1413 1414 210ad4e-210ad50 1410->1414 1411->1413 1412->1410 1415 210ad00-210ad01 1414->1415 1416 210ad52 1414->1416 1415->1389 1416->1415 1418 210ad54-210ad58 1416->1418
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$YLfX$k $z:w$z:w
          • API String ID: 0-594147441
          • Opcode ID: 34fc540719d15b94782ff90d4458909eedbc2110ce532e8e4a0226a1f485dbac
          • Instruction ID: 8f40cca18d9e3033b20b819068a40237c81e9e920b4d83587dae76ed0ffe8fb5
          • Opcode Fuzzy Hash: 34fc540719d15b94782ff90d4458909eedbc2110ce532e8e4a0226a1f485dbac
          • Instruction Fuzzy Hash: FD424571A44349DFDB389E34CD857EA7BB2FF85310F56422ADC999B290C3B05A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1419 2105f21-2105f6c 1421 2105f6f-2105f86 1419->1421 1422 21070f2-21071ea 1421->1422 1423 2105f8c-2105ffe 1421->1423 1423->1421 1426 2106004-2106299 GetPEB 1423->1426 1438 21062a4-2106319 1426->1438 1439 210629f call 211079c 1426->1439 1441 2105f0d-2109451 call 2105f21 1438->1441 1442 210631f-2106467 call 211079c 1438->1442 1439->1438 1451 2109456 1441->1451 1453 210646d 1442->1453 1454 21112ee-2111337 call 211133a 1442->1454 1451->1451 1455 211156a call 2106472 1453->1455 1454->1455 1460 211156f-211157b call 21114d9 1455->1460 1463 21115c9-21115d7 1460->1463 1464 211157d-21115c7 1460->1464 1465 21115e0-21116ba call 21114d9 1463->1465 1466 21115d9-21115de 1463->1466 1464->1463 1465->1460 1466->1460
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 20009716c46d676f1c39b6f388ff8f0be946a6a3b7a1805966c96f6fa4503a46
          • Instruction ID: 2fe62f1b8b50892b702bf212f452c651c39442ff674104b7c6e5c64ca5bb46b9
          • Opcode Fuzzy Hash: 20009716c46d676f1c39b6f388ff8f0be946a6a3b7a1805966c96f6fa4503a46
          • Instruction Fuzzy Hash: 3E925271A44349DFDB389F34C9957EAB7B2BF46350F56812EDC9A9B290C3704A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1475 21070af-21070b4 1476 21070b6-21070b8 1475->1476 1477 21070df-21070e0 1475->1477 1479 2107068-2107072 1476->1479 1480 21070ba 1476->1480 1478 21070e1-21070e5 1477->1478 1482 21070e7 1478->1482 1481 2107074-210707d 1479->1481 1480->1479 1483 21070bc-21070c0 1480->1483 1484 2107080-2107085 1481->1484 1485 21070c2-21070c4 1483->1485 1486 21070eb-21070f0 1483->1486 1484->1482 1485->1481 1488 21070c6 1485->1488 1487 21070f4 1486->1487 1490 21070f7 1487->1490 1488->1481 1489 21070c8-21070cc 1488->1489 1489->1490 1491 21070ce-21070d0 1489->1491 1492 2107138 1490->1492 1493 21070f9-21070fa 1490->1493 1491->1484 1499 21070d2 1491->1499 1495 21070e8-21070ea 1492->1495 1496 210713a 1492->1496 1497 2107100-2107101 1493->1497 1495->1486 1496->1495 1500 210713c-2107144 1496->1500 1498 2107103-210711a 1497->1498 1501 2107158-21071ea 1498->1501 1499->1484 1502 21070d4-21070d8 1499->1502 1500->1487 1508 2107146 1500->1508 1502->1498 1504 21070da-21070dc 1502->1504 1510 210708c-21070a3 1504->1510 1511 21070de 1504->1511 1508->1487 1512 2107148-2107150 1508->1512 1510->1478 1511->1477 1511->1510 1512->1497 1516 2107152 1512->1516 1516->1497 1517 2107154-2107155 1516->1517 1517->1501
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 6b3d5b5f4deaebf04cf897800637f7dd03edf4a28e30080da83caab1d428d066
          • Instruction ID: b4e74a437828db2bdd99cce7bde28c85058a79f22d4a2482721c450077358a68
          • Opcode Fuzzy Hash: 6b3d5b5f4deaebf04cf897800637f7dd03edf4a28e30080da83caab1d428d066
          • Instruction Fuzzy Hash: 3E725471A44345DFDB389E34CD957EABBB2FF46300F56822ADC999B280D3705A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 7a3e863e3ffcc3547bcc6a11085127434d991cf90c00ea55ad763eb152ba4868
          • Instruction ID: d2190c0303d2efc1b11098ece4d506e6c989f2617fdea1fb31ee00f07e75a5a1
          • Opcode Fuzzy Hash: 7a3e863e3ffcc3547bcc6a11085127434d991cf90c00ea55ad763eb152ba4868
          • Instruction Fuzzy Hash: 59723271A44345DFDB389E38C9953EABBB2FF46310F56812EDC999B280D3705A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1968 210711d-2107120 1969 21070d0 1968->1969 1970 2107122 1968->1970 1971 2107080-2107085 1969->1971 1972 21070d2 1969->1972 1970->1969 1973 2107124-2107128 1970->1973 1977 21070e7 1971->1977 1972->1971 1976 21070d4-21070d8 1972->1976 1974 2107153-2107155 1973->1974 1975 210712a-210712c 1973->1975 1982 2107158-21071ea 1974->1982 1978 21070dc 1975->1978 1979 210712e 1975->1979 1980 2107103-210711a 1976->1980 1981 21070da-21070db 1976->1981 1984 210708c-21070a3 1978->1984 1985 21070de 1978->1985 1979->1978 1983 2107130-2107137 1979->1983 1980->1982 1981->1978 1991 2107138 1983->1991 1990 21070e1-21070e5 1984->1990 1985->1984 1988 21070df-21070e0 1985->1988 1988->1990 1990->1977 1993 21070e8-21070f0 1991->1993 1994 210713a 1991->1994 1998 21070f4-21070f7 1993->1998 1994->1993 1995 210713c-2107144 1994->1995 1995->1998 2001 2107146 1995->2001 1998->1991 2002 21070f9-21070fa 1998->2002 2001->1998 2003 2107148-2107150 2001->2003 2004 2107100-2107101 2002->2004 2003->2004 2007 2107152 2003->2007 2004->1980 2007->2004 2008 2107154-2107155 2007->2008 2008->1982
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 7a69a5eaa11b7e2f746e549b489c7e4ae01caf3627dc4ce3628b033c4b21e765
          • Instruction ID: fd9a625783fc910cc3aa17d33d9fbd99af7c1f4f25214f23011ef17dccd3e17d
          • Opcode Fuzzy Hash: 7a69a5eaa11b7e2f746e549b489c7e4ae01caf3627dc4ce3628b033c4b21e765
          • Instruction Fuzzy Hash: 45724271644349DFDB389E34CD957EABBB2FF46340F56822ADC999B280C3705A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2009 2107191-2107194 2010 2107144 2009->2010 2011 2107196 2009->2011 2012 21070f4-21070f7 2010->2012 2013 2107146 2010->2013 2011->2010 2014 2107198-210719c 2011->2014 2023 2107138 2012->2023 2024 21070f9-21070fa 2012->2024 2013->2012 2015 2107148-210714f 2013->2015 2016 21071c7-21071c9 2014->2016 2017 210719e-21071a0 2014->2017 2021 2107150 2015->2021 2019 21071cc-21071ea 2016->2019 2017->2021 2022 21071a2 2017->2022 2028 2107100-210711a 2021->2028 2029 2107152 2021->2029 2022->2021 2030 21071a4-21071c0 2022->2030 2025 21070e8-21070f0 2023->2025 2026 210713a 2023->2026 2024->2028 2025->2012 2026->2025 2032 210713c-2107143 2026->2032 2037 2107158-210718e 2028->2037 2029->2028 2035 2107154-2107155 2029->2035 2045 21071c2-21071c9 2030->2045 2046 21071eb-21076bc call 210ee7a call 2108b94 call 211079c 2030->2046 2032->2010 2035->2037 2037->2019 2045->2019 2087 21076c2-2107c1c call 2109068 call 21077cf call 210cd69 call 211079c 2046->2087 2088 21089f5-2108b89 call 211079c * 3 2046->2088 2114 210ce70-210ce93 2087->2114 2177 2107c22-2107c2f 2087->2177 2088->2114 2115 2108b8f-2108b90 2088->2115 2117 210ce99-210ceff 2114->2117 2118 2100dcb-2100e2b call 2100c2c 2114->2118 2117->2114 2124 210cf05-210cf20 2117->2124 2127 210cf26-210cf52 2124->2127 2128 211144d-2111453 2124->2128 2132 210d0f5-210d105 LoadLibraryA call 210d108 2127->2132 2133 210cf58-210cfbf call 210d822 2127->2133 2130 2111454-21114ce 2128->2130 2141 21114d0-21114d2 2130->2141 2133->2128 2146 210cfc5-210cfe3 2133->2146 2148 210d0a2-210d0f3 call 210d108 2146->2148 2149 210cfe9-210d08e call 210d822 call 210d04b 2146->2149 2148->2132 2149->2148 2166 210d090-210d09f call 210d822 2149->2166 2166->2148 2177->2088 2178 2107c35-2107c97 2177->2178 2178->2118 2181 2107c9d-2107e8a call 211079c 2178->2181 2181->2088 2193 2107e90-21081cc call 211079c call 21081a4 2181->2193 2193->2088 2211 21081d2-2108242 2193->2211 2211->2088 2213 2108248-210828c 2211->2213 2216 2108301-2108371 2213->2216 2217 210828e-21082fb 2213->2217 2216->2088 2223 2108377-2108544 2216->2223 2217->2088 2217->2216 2235 2100e30-2100f5b call 21114d9 call 210ce70 2223->2235 2236 210854a-21085cd call 210d463 2223->2236 2235->2114 2255 2100f61-210105b call 211079c call 210ce70 2235->2255 2236->2088 2250 21085d3-2108717 call 211144d NtWriteVirtualMemory 2236->2250 2250->2088 2273 210871d-210883a call 211079c 2250->2273 2274 210105d-21010e8 2255->2274 2273->2088 2291 2108840-2108901 call 211079c 2273->2291 2283 21070f2-210711a 2274->2283 2284 21010ee-2101259 call 210d463 2274->2284 2283->2037 2284->2274 2313 210125f-210aa67 call 2101270 call 210aa51 2284->2313 2291->2088 2300 2108907-21089f2 call 211079c * 2 2291->2300 2324 210aa68-210aaac call 2100a9f 2313->2324 2339 210aa5c 2324->2339 2340 210aaae 2324->2340 2342 210aa52 2339->2342 2343 210aa5e-210aa63 2339->2343 2340->2339 2341 210aab0-210aab8 2340->2341 2341->2324 2346 210aaba-210ab1d call 2100ba0 2341->2346 2342->2342 2354 210ab20-210ab29 2346->2354 2358 210ab2c 2354->2358 2359 210ab57-210ab5d 2358->2359 2360 210ab2e-210ab35 2358->2360 2365 210ab60-210ab62 2359->2365 2366 210ab38 2360->2366 2368 210ab63-210ab69 2365->2368 2366->2368 2369 210ab3a-210ab44 2366->2369 2374 210ab6c 2368->2374 2375 210ab46-210ab4d 2369->2375 2376 210ab6f-210ab70 2369->2376 2377 210ab97-210aba1 2374->2377 2378 210ab6e 2374->2378 2384 210ab54-210ab56 2375->2384 2376->2354 2379 210ab72 2376->2379 2385 210aba3-210aba6 2377->2385 2378->2376 2379->2354 2382 210ab74-210ab75 2379->2382 2386 210ab78 2382->2386 2384->2359 2385->2384 2389 210aba8-210abae 2385->2389 2386->2385 2387 210ab7a-210ab7c 2386->2387 2387->2358 2390 210ab7e 2387->2390 2393 210abaf-210abb0 2389->2393 2390->2358 2392 210ab80-210ab81 2390->2392 2394 210ab84 2392->2394 2393->2365 2395 210abb2 2393->2395 2394->2393 2396 210ab86-210ab88 2394->2396 2395->2365 2397 210abb4-210abbc 2395->2397 2396->2366 2398 210ab8a 2396->2398 2397->2374 2400 210abbe 2397->2400 2398->2366 2401 210ab8c-210ab95 2398->2401 2400->2374 2402 210abc0-210abc4 2400->2402 2401->2377 2403 210abc6-210abc8 2402->2403 2404 210abef-210ac42 call 2109075 2402->2404 2403->2386 2405 210abca 2403->2405 2412 210ac80-210acd0 call 2108b9d 2404->2412 2405->2386 2407 210abcc-210abd4 2405->2407 2407->2394 2411 210abd6 2407->2411 2411->2394 2413 210abd8-210abee call 210a2c5 2411->2413 2428 210acd2 2412->2428 2413->2404 2428->2412 2429 210acd4-210acd8 2428->2429 2430 210ad03-210ad0e 2429->2430 2431 210acda-210acdb 2429->2431 2432 210ad0f-210ad2c 2430->2432 2433 210acdc-210ace4 2431->2433 2432->2433 2441 210ad2e 2432->2441 2433->2432 2438 210ace6-210acf3 call 2109500 2433->2438 2441->2433 2443 210ad30-210ad40 2441->2443 2447 210ad42-210ad46 2443->2447 2448 210ad6b-210ad71 2443->2448 2451 210ad48-210ad4c 2447->2451 2452 210ad73-210ad76 2448->2452 2453 210ad45-210ad46 2448->2453 2454 210ad77-210ad89 2451->2454 2455 210ad4e-210ad50 2451->2455 2452->2454 2453->2451 2456 210ad00-210ad01 2455->2456 2457 210ad52 2455->2457 2456->2430 2457->2456 2459 210ad54-210ad58 2457->2459
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: a845b4d3310cc20399455bfd48746cfd9f2c17751066349376039a798bde6b2b
          • Instruction ID: d50cfca6b0e291796868e7505841170958c5480d674c44038a91c69937f6ec7b
          • Opcode Fuzzy Hash: a845b4d3310cc20399455bfd48746cfd9f2c17751066349376039a798bde6b2b
          • Instruction Fuzzy Hash: 9B724271A44349DFDB389E34CD953EABBB2FF85340F56422ADC999B280D3705A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2460 2107381-2107384 2461 2107334 2460->2461 2462 2107386 2460->2462 2463 21072e4-2107302 2461->2463 2464 2107336 2461->2464 2462->2461 2465 2107388-210738c 2462->2465 2470 210733c-2107363 2463->2470 2464->2463 2467 2107338-2107339 2464->2467 2468 21073b7-21073bf 2465->2468 2469 210738e-21073b4 2465->2469 2467->2470 2473 21073c0-21076bc call 2108b94 call 211079c 2468->2473 2476 2107364-210737e 2469->2476 2491 21073b6 2469->2491 2470->2476 2504 21076c2-2107c1c call 2109068 call 21077cf call 210cd69 call 211079c 2473->2504 2505 21089f5-2108b89 call 211079c * 3 2473->2505 2476->2473 2491->2468 2491->2476 2531 210ce70-210ce93 2504->2531 2594 2107c22-2107c2f 2504->2594 2505->2531 2532 2108b8f-2108b90 2505->2532 2534 210ce99-210ceff 2531->2534 2535 2100dcb-2100e2b call 2100c2c 2531->2535 2534->2531 2541 210cf05-210cf20 2534->2541 2544 210cf26-210cf52 2541->2544 2545 211144d-2111453 2541->2545 2549 210d0f5-210d105 LoadLibraryA call 210d108 2544->2549 2550 210cf58-210cfbf call 210d822 2544->2550 2547 2111454-21114ce 2545->2547 2558 21114d0-21114d2 2547->2558 2550->2545 2563 210cfc5-210cfe3 2550->2563 2565 210d0a2-210d0f3 call 210d108 2563->2565 2566 210cfe9-210d08e call 210d822 call 210d04b 2563->2566 2565->2549 2566->2565 2583 210d090-210d09f call 210d822 2566->2583 2583->2565 2594->2505 2595 2107c35-2107c97 2594->2595 2595->2535 2598 2107c9d-2107e8a call 211079c 2595->2598 2598->2505 2610 2107e90-21081cc call 211079c call 21081a4 2598->2610 2610->2505 2628 21081d2-2108242 2610->2628 2628->2505 2630 2108248-210828c 2628->2630 2633 2108301-2108371 2630->2633 2634 210828e-21082fb 2630->2634 2633->2505 2640 2108377-2108544 2633->2640 2634->2505 2634->2633 2652 2100e30-2100f5b call 21114d9 call 210ce70 2640->2652 2653 210854a-21085cd call 210d463 2640->2653 2652->2531 2672 2100f61-210105b call 211079c call 210ce70 2652->2672 2653->2505 2667 21085d3-2108717 call 211144d NtWriteVirtualMemory 2653->2667 2667->2505 2690 210871d-210883a call 211079c 2667->2690 2691 210105d-21010e8 2672->2691 2690->2505 2711 2108840-2108901 call 211079c 2690->2711 2700 21070f2-21071ea 2691->2700 2701 21010ee-2101259 call 210d463 2691->2701 2701->2691 2734 210125f-210aa67 call 2101270 call 210aa51 2701->2734 2711->2505 2721 2108907-21089f2 call 211079c * 2 2711->2721 2745 210aa68-210aaac call 2100a9f 2734->2745 2760 210aa5c 2745->2760 2761 210aaae 2745->2761 2763 210aa52 2760->2763 2764 210aa5e-210aa63 2760->2764 2761->2760 2762 210aab0-210aab8 2761->2762 2762->2745 2767 210aaba-210ab1d call 2100ba0 2762->2767 2763->2763 2775 210ab20-210ab29 2767->2775 2779 210ab2c 2775->2779 2780 210ab57-210ab5d 2779->2780 2781 210ab2e-210ab35 2779->2781 2786 210ab60-210ab62 2780->2786 2787 210ab38 2781->2787 2789 210ab63-210ab69 2786->2789 2787->2789 2790 210ab3a-210ab44 2787->2790 2795 210ab6c 2789->2795 2796 210ab46-210ab4d 2790->2796 2797 210ab6f-210ab70 2790->2797 2798 210ab97-210aba1 2795->2798 2799 210ab6e 2795->2799 2805 210ab54-210ab56 2796->2805 2797->2775 2800 210ab72 2797->2800 2806 210aba3-210aba6 2798->2806 2799->2797 2800->2775 2803 210ab74-210ab75 2800->2803 2807 210ab78 2803->2807 2805->2780 2806->2805 2810 210aba8-210abae 2806->2810 2807->2806 2808 210ab7a-210ab7c 2807->2808 2808->2779 2811 210ab7e 2808->2811 2814 210abaf-210abb0 2810->2814 2811->2779 2813 210ab80-210ab81 2811->2813 2815 210ab84 2813->2815 2814->2786 2816 210abb2 2814->2816 2815->2814 2817 210ab86-210ab88 2815->2817 2816->2786 2818 210abb4-210abbc 2816->2818 2817->2787 2819 210ab8a 2817->2819 2818->2795 2821 210abbe 2818->2821 2819->2787 2822 210ab8c-210ab95 2819->2822 2821->2795 2823 210abc0-210abc4 2821->2823 2822->2798 2824 210abc6-210abc8 2823->2824 2825 210abef-210ac42 call 2109075 2823->2825 2824->2807 2826 210abca 2824->2826 2833 210ac80-210acd0 call 2108b9d 2825->2833 2826->2807 2828 210abcc-210abd4 2826->2828 2828->2815 2832 210abd6 2828->2832 2832->2815 2834 210abd8-210abee call 210a2c5 2832->2834 2849 210acd2 2833->2849 2834->2825 2849->2833 2850 210acd4-210acd8 2849->2850 2851 210ad03-210ad0e 2850->2851 2852 210acda-210acdb 2850->2852 2853 210ad0f-210ad2c 2851->2853 2854 210acdc-210ace4 2852->2854 2853->2854 2862 210ad2e 2853->2862 2854->2853 2859 210ace6-210acf3 call 2109500 2854->2859 2862->2854 2864 210ad30-210ad40 2862->2864 2868 210ad42-210ad46 2864->2868 2869 210ad6b-210ad71 2864->2869 2872 210ad48-210ad4c 2868->2872 2873 210ad73-210ad76 2869->2873 2874 210ad45-210ad46 2869->2874 2875 210ad77-210ad89 2872->2875 2876 210ad4e-210ad50 2872->2876 2873->2875 2874->2872 2877 210ad00-210ad01 2876->2877 2878 210ad52 2876->2878 2877->2851 2878->2877 2880 210ad54-210ad58 2878->2880
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 103ba71c57e15379499f9d10fbab3b6bb0eebf1dfeb3da974827578b9b6baa28
          • Instruction ID: b336ec11dd8978efa6f8c57a43506573eddaf632bd57d97c443866169ee7868d
          • Opcode Fuzzy Hash: 103ba71c57e15379499f9d10fbab3b6bb0eebf1dfeb3da974827578b9b6baa28
          • Instruction Fuzzy Hash: 5A623371A44349DFDB388E34CD957EABBB2BF46300F56812EDC999B290D3705A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 76c7fd993b7ccd266f2fb46d5022b46fd8fabe0e4ab338072546f1a65924ac8a
          • Instruction ID: 9fda937d2db7cc0e0c0d655d28149e3b15e3c4740aec1e8914a331ecced4230c
          • Opcode Fuzzy Hash: 76c7fd993b7ccd266f2fb46d5022b46fd8fabe0e4ab338072546f1a65924ac8a
          • Instruction Fuzzy Hash: 00623371A44349DFDB389E34CD953EA7BB2BF46340F56812EDC999B280D3705A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: eb5bf9d82fff5aa6dec5ed1fc64c8a3d62f6691469ba65fdd9e8d0771846069d
          • Instruction ID: 0df11e2c7b18d30ae7f1ffba40dbe5ab3cdd441a1e12ba61f817dea1226cb192
          • Opcode Fuzzy Hash: eb5bf9d82fff5aa6dec5ed1fc64c8a3d62f6691469ba65fdd9e8d0771846069d
          • Instruction Fuzzy Hash: 3D622271A44349DFDB389E34CD953EABBB2FF46300F56812ADC999B290D3705A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 3756 210741b-2107420 3757 2107422-2107424 3756->3757 3758 210744b-2107456 3756->3758 3760 21073d4-21073df 3757->3760 3761 2107426 3757->3761 3767 2107457 3758->3767 3763 21073e0-21073eb 3760->3763 3761->3760 3764 2107428-210742c 3761->3764 3766 21073ec-21073f2 3763->3766 3764->3767 3768 210742e-2107430 3764->3768 3769 21073f8-2107416 3766->3769 3770 2107458-210745c 3767->3770 3768->3763 3771 2107432 3768->3771 3769->3770 3772 2107463-21076bc call 2108b94 call 211079c 3770->3772 3771->3763 3773 2107434-2107438 3771->3773 3795 21076c2-2107c1c call 2109068 call 21077cf call 210cd69 call 211079c 3772->3795 3796 21089f5-2108b89 call 211079c * 3 3772->3796 3773->3772 3775 210743a-210743c 3773->3775 3775->3766 3777 210743e 3775->3777 3777->3766 3779 2107440-2107448 3777->3779 3779->3769 3783 210744a 3779->3783 3783->3758 3783->3769 3822 210ce70-210ce93 3795->3822 3885 2107c22-2107c2f 3795->3885 3796->3822 3823 2108b8f-2108b90 3796->3823 3825 210ce99-210ceff 3822->3825 3826 2100dcb-2100e2b call 2100c2c 3822->3826 3825->3822 3832 210cf05-210cf20 3825->3832 3835 210cf26-210cf52 3832->3835 3836 211144d-2111453 3832->3836 3840 210d0f5-210d105 LoadLibraryA call 210d108 3835->3840 3841 210cf58-210cfbf call 210d822 3835->3841 3838 2111454-21114ce 3836->3838 3849 21114d0-21114d2 3838->3849 3841->3836 3854 210cfc5-210cfe3 3841->3854 3856 210d0a2-210d0f3 call 210d108 3854->3856 3857 210cfe9-210d08e call 210d822 call 210d04b 3854->3857 3856->3840 3857->3856 3874 210d090-210d09f call 210d822 3857->3874 3874->3856 3885->3796 3886 2107c35-2107c97 3885->3886 3886->3826 3889 2107c9d-2107e8a call 211079c 3886->3889 3889->3796 3901 2107e90-21081cc call 211079c call 21081a4 3889->3901 3901->3796 3919 21081d2-2108242 3901->3919 3919->3796 3921 2108248-210828c 3919->3921 3924 2108301-2108371 3921->3924 3925 210828e-21082fb 3921->3925 3924->3796 3931 2108377-2108544 3924->3931 3925->3796 3925->3924 3943 2100e30-2100f5b call 21114d9 call 210ce70 3931->3943 3944 210854a-21085cd call 210d463 3931->3944 3943->3822 3963 2100f61-210105b call 211079c call 210ce70 3943->3963 3944->3796 3958 21085d3-2108717 call 211144d NtWriteVirtualMemory 3944->3958 3958->3796 3981 210871d-210883a call 211079c 3958->3981 3982 210105d-21010e8 3963->3982 3981->3796 4002 2108840-2108901 call 211079c 3981->4002 3991 21070f2-21071ea 3982->3991 3992 21010ee-2101259 call 210d463 3982->3992 3992->3982 4025 210125f-210aa67 call 2101270 call 210aa51 3992->4025 4002->3796 4012 2108907-21089f2 call 211079c * 2 4002->4012 4036 210aa68-210aaac call 2100a9f 4025->4036 4051 210aa5c 4036->4051 4052 210aaae 4036->4052 4054 210aa52 4051->4054 4055 210aa5e-210aa63 4051->4055 4052->4051 4053 210aab0-210aab8 4052->4053 4053->4036 4058 210aaba-210ab1d call 2100ba0 4053->4058 4054->4054 4066 210ab20-210ab29 4058->4066 4070 210ab2c 4066->4070 4071 210ab57-210ab5d 4070->4071 4072 210ab2e-210ab35 4070->4072 4077 210ab60-210ab62 4071->4077 4078 210ab38 4072->4078 4080 210ab63-210ab69 4077->4080 4078->4080 4081 210ab3a-210ab44 4078->4081 4086 210ab6c 4080->4086 4087 210ab46-210ab4d 4081->4087 4088 210ab6f-210ab70 4081->4088 4089 210ab97-210aba1 4086->4089 4090 210ab6e 4086->4090 4096 210ab54-210ab56 4087->4096 4088->4066 4091 210ab72 4088->4091 4097 210aba3-210aba6 4089->4097 4090->4088 4091->4066 4094 210ab74-210ab75 4091->4094 4098 210ab78 4094->4098 4096->4071 4097->4096 4101 210aba8-210abae 4097->4101 4098->4097 4099 210ab7a-210ab7c 4098->4099 4099->4070 4102 210ab7e 4099->4102 4105 210abaf-210abb0 4101->4105 4102->4070 4104 210ab80-210ab81 4102->4104 4106 210ab84 4104->4106 4105->4077 4107 210abb2 4105->4107 4106->4105 4108 210ab86-210ab88 4106->4108 4107->4077 4109 210abb4-210abbc 4107->4109 4108->4078 4110 210ab8a 4108->4110 4109->4086 4112 210abbe 4109->4112 4110->4078 4113 210ab8c-210ab95 4110->4113 4112->4086 4114 210abc0-210abc4 4112->4114 4113->4089 4115 210abc6-210abc8 4114->4115 4116 210abef-210ac42 call 2109075 4114->4116 4115->4098 4117 210abca 4115->4117 4124 210ac80-210acd0 call 2108b9d 4116->4124 4117->4098 4119 210abcc-210abd4 4117->4119 4119->4106 4123 210abd6 4119->4123 4123->4106 4125 210abd8-210abee call 210a2c5 4123->4125 4140 210acd2 4124->4140 4125->4116 4140->4124 4141 210acd4-210acd8 4140->4141 4142 210ad03-210ad0e 4141->4142 4143 210acda-210acdb 4141->4143 4144 210ad0f-210ad2c 4142->4144 4145 210acdc-210ace4 4143->4145 4144->4145 4153 210ad2e 4144->4153 4145->4144 4150 210ace6-210acf3 call 2109500 4145->4150 4153->4145 4155 210ad30-210ad40 4153->4155 4159 210ad42-210ad46 4155->4159 4160 210ad6b-210ad71 4155->4160 4163 210ad48-210ad4c 4159->4163 4164 210ad73-210ad76 4160->4164 4165 210ad45-210ad46 4160->4165 4166 210ad77-210ad89 4163->4166 4167 210ad4e-210ad50 4163->4167 4164->4166 4165->4163 4168 210ad00-210ad01 4167->4168 4169 210ad52 4167->4169 4168->4142 4169->4168 4171 210ad54-210ad58 4169->4171
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 8a379d93cd12b5e9735de0af25746bc8f11833d231c8c9be8c43c9a10377bece
          • Instruction ID: d46c1a7d9d6d9a4ae9c9f8e93f9dda18151d2b5af9f03dfe7639508bfb8c25bf
          • Opcode Fuzzy Hash: 8a379d93cd12b5e9735de0af25746bc8f11833d231c8c9be8c43c9a10377bece
          • Instruction Fuzzy Hash: 83623271A44349DFDB389E38CD957EA7BA2FF46300F56812EDC999B290D3705A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 4172 210749c-21074a0 4173 21074a2-21074a4 4172->4173 4174 21074cb-21074d6 4172->4174 4175 2107454-210745c 4173->4175 4176 21074a6 4173->4176 4181 21074d7-21074d9 4174->4181 4188 2107463-2107465 4175->4188 4176->4175 4178 21074a8-21074ac 4176->4178 4178->4181 4182 21074ae-21074b0 4178->4182 4184 21074dc-21074ed 4181->4184 4185 2107460-2107462 4182->4185 4186 21074b2 4182->4186 4189 21074ef-21076bc call 2108b94 call 211079c 4184->4189 4185->4188 4186->4185 4190 21074b4-21074bc 4186->4190 4191 210746c-210749a 4188->4191 4210 21076c2-2107c1c call 2109068 call 21077cf call 210cd69 call 211079c 4189->4210 4211 21089f5-2108b89 call 211079c * 3 4189->4211 4190->4191 4195 21074be 4190->4195 4191->4184 4195->4191 4197 21074c0-21074c4 4195->4197 4197->4189 4199 21074c6-21074ca 4197->4199 4199->4174 4237 210ce70-210ce93 4210->4237 4300 2107c22-2107c2f 4210->4300 4211->4237 4238 2108b8f-2108b90 4211->4238 4240 210ce99-210ceff 4237->4240 4241 2100dcb-2100e2b call 2100c2c 4237->4241 4240->4237 4247 210cf05-210cf20 4240->4247 4250 210cf26-210cf52 4247->4250 4251 211144d-2111453 4247->4251 4255 210d0f5-210d105 LoadLibraryA call 210d108 4250->4255 4256 210cf58-210cfbf call 210d822 4250->4256 4253 2111454-21114ce 4251->4253 4264 21114d0-21114d2 4253->4264 4256->4251 4269 210cfc5-210cfe3 4256->4269 4271 210d0a2-210d0f3 call 210d108 4269->4271 4272 210cfe9-210d08e call 210d822 call 210d04b 4269->4272 4271->4255 4272->4271 4289 210d090-210d09f call 210d822 4272->4289 4289->4271 4300->4211 4301 2107c35-2107c97 4300->4301 4301->4241 4304 2107c9d-2107e8a call 211079c 4301->4304 4304->4211 4316 2107e90-21081cc call 211079c call 21081a4 4304->4316 4316->4211 4334 21081d2-2108242 4316->4334 4334->4211 4336 2108248-210828c 4334->4336 4339 2108301-2108371 4336->4339 4340 210828e-21082fb 4336->4340 4339->4211 4346 2108377-2108544 4339->4346 4340->4211 4340->4339 4358 2100e30-2100f5b call 21114d9 call 210ce70 4346->4358 4359 210854a-21085cd call 210d463 4346->4359 4358->4237 4378 2100f61-210105b call 211079c call 210ce70 4358->4378 4359->4211 4373 21085d3-2108717 call 211144d NtWriteVirtualMemory 4359->4373 4373->4211 4396 210871d-210883a call 211079c 4373->4396 4397 210105d-21010e8 4378->4397 4396->4211 4417 2108840-2108901 call 211079c 4396->4417 4406 21070f2-21071ea 4397->4406 4407 21010ee-2101259 call 210d463 4397->4407 4407->4397 4440 210125f-210aa67 call 2101270 call 210aa51 4407->4440 4417->4211 4427 2108907-21089f2 call 211079c * 2 4417->4427 4451 210aa68-210aaac call 2100a9f 4440->4451 4466 210aa5c 4451->4466 4467 210aaae 4451->4467 4469 210aa52 4466->4469 4470 210aa5e-210aa63 4466->4470 4467->4466 4468 210aab0-210aab8 4467->4468 4468->4451 4473 210aaba-210ab1d call 2100ba0 4468->4473 4469->4469 4481 210ab20-210ab29 4473->4481 4485 210ab2c 4481->4485 4486 210ab57-210ab5d 4485->4486 4487 210ab2e-210ab35 4485->4487 4492 210ab60-210ab62 4486->4492 4493 210ab38 4487->4493 4495 210ab63-210ab69 4492->4495 4493->4495 4496 210ab3a-210ab44 4493->4496 4501 210ab6c 4495->4501 4502 210ab46-210ab4d 4496->4502 4503 210ab6f-210ab70 4496->4503 4504 210ab97-210aba1 4501->4504 4505 210ab6e 4501->4505 4511 210ab54-210ab56 4502->4511 4503->4481 4506 210ab72 4503->4506 4512 210aba3-210aba6 4504->4512 4505->4503 4506->4481 4509 210ab74-210ab75 4506->4509 4513 210ab78 4509->4513 4511->4486 4512->4511 4516 210aba8-210abae 4512->4516 4513->4512 4514 210ab7a-210ab7c 4513->4514 4514->4485 4517 210ab7e 4514->4517 4520 210abaf-210abb0 4516->4520 4517->4485 4519 210ab80-210ab81 4517->4519 4521 210ab84 4519->4521 4520->4492 4522 210abb2 4520->4522 4521->4520 4523 210ab86-210ab88 4521->4523 4522->4492 4524 210abb4-210abbc 4522->4524 4523->4493 4525 210ab8a 4523->4525 4524->4501 4527 210abbe 4524->4527 4525->4493 4528 210ab8c-210ab95 4525->4528 4527->4501 4529 210abc0-210abc4 4527->4529 4528->4504 4530 210abc6-210abc8 4529->4530 4531 210abef-210ac42 call 2109075 4529->4531 4530->4513 4532 210abca 4530->4532 4539 210ac80-210acd0 call 2108b9d 4531->4539 4532->4513 4534 210abcc-210abd4 4532->4534 4534->4521 4538 210abd6 4534->4538 4538->4521 4540 210abd8-210abee call 210a2c5 4538->4540 4555 210acd2 4539->4555 4540->4531 4555->4539 4556 210acd4-210acd8 4555->4556 4557 210ad03-210ad0e 4556->4557 4558 210acda-210acdb 4556->4558 4559 210ad0f-210ad2c 4557->4559 4560 210acdc-210ace4 4558->4560 4559->4560 4568 210ad2e 4559->4568 4560->4559 4565 210ace6-210acf3 call 2109500 4560->4565 4568->4560 4570 210ad30-210ad40 4568->4570 4574 210ad42-210ad46 4570->4574 4575 210ad6b-210ad71 4570->4575 4578 210ad48-210ad4c 4574->4578 4579 210ad73-210ad76 4575->4579 4580 210ad45-210ad46 4575->4580 4581 210ad77-210ad89 4578->4581 4582 210ad4e-210ad50 4578->4582 4579->4581 4580->4578 4583 210ad00-210ad01 4582->4583 4584 210ad52 4582->4584 4583->4557 4584->4583 4586 210ad54-210ad58 4584->4586
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 05cebbb44d7d5a5881746a7bc766f447aa4abfa62c822f0533ddebbb0e9933b8
          • Instruction ID: 3e0c7dc7eeb498bd36190c9720e1c88cddc38d031d5d17a0532c062a126e3e6d
          • Opcode Fuzzy Hash: 05cebbb44d7d5a5881746a7bc766f447aa4abfa62c822f0533ddebbb0e9933b8
          • Instruction Fuzzy Hash: F3623271A44349DFDB389E38CD957EA7BA2FF46310F56412EDC999B290C3705A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 4587 2107529-210752c 4588 21074dc-2107526 4587->4588 4589 210752e 4587->4589 4592 2107560-2107571 4588->4592 4589->4588 4591 2107530-2107534 4589->4591 4593 2107536-210754c 4591->4593 4594 210755f 4591->4594 4597 2107577-2107581 4592->4597 4593->4597 4605 210754e-2107558 4593->4605 4594->4592 4599 2107583-21076bc call 2108b94 call 211079c 4597->4599 4618 21076c2-2107c1c call 2109068 call 21077cf call 210cd69 call 211079c 4599->4618 4619 21089f5-2108b89 call 211079c * 3 4599->4619 4605->4599 4613 210755a-210755e 4605->4613 4613->4594 4645 210ce70-210ce93 4618->4645 4708 2107c22-2107c2f 4618->4708 4619->4645 4646 2108b8f-2108b90 4619->4646 4648 210ce99-210ceff 4645->4648 4649 2100dcb-2100e2b call 2100c2c 4645->4649 4648->4645 4655 210cf05-210cf20 4648->4655 4658 210cf26-210cf52 4655->4658 4659 211144d-2111453 4655->4659 4663 210d0f5-210d105 LoadLibraryA call 210d108 4658->4663 4664 210cf58-210cfbf call 210d822 4658->4664 4661 2111454-21114ce 4659->4661 4672 21114d0-21114d2 4661->4672 4664->4659 4677 210cfc5-210cfe3 4664->4677 4679 210d0a2-210d0f3 call 210d108 4677->4679 4680 210cfe9-210d08e call 210d822 call 210d04b 4677->4680 4679->4663 4680->4679 4697 210d090-210d09f call 210d822 4680->4697 4697->4679 4708->4619 4709 2107c35-2107c97 4708->4709 4709->4649 4712 2107c9d-2107e8a call 211079c 4709->4712 4712->4619 4724 2107e90-21081cc call 211079c call 21081a4 4712->4724 4724->4619 4742 21081d2-2108242 4724->4742 4742->4619 4744 2108248-210828c 4742->4744 4747 2108301-2108371 4744->4747 4748 210828e-21082fb 4744->4748 4747->4619 4754 2108377-2108544 4747->4754 4748->4619 4748->4747 4766 2100e30-2100f5b call 21114d9 call 210ce70 4754->4766 4767 210854a-21085cd call 210d463 4754->4767 4766->4645 4786 2100f61-210105b call 211079c call 210ce70 4766->4786 4767->4619 4781 21085d3-2108717 call 211144d NtWriteVirtualMemory 4767->4781 4781->4619 4804 210871d-210883a call 211079c 4781->4804 4805 210105d-21010e8 4786->4805 4804->4619 4825 2108840-2108901 call 211079c 4804->4825 4814 21070f2-21071ea 4805->4814 4815 21010ee-2101259 call 210d463 4805->4815 4815->4805 4848 210125f-210aa67 call 2101270 call 210aa51 4815->4848 4825->4619 4835 2108907-21089f2 call 211079c * 2 4825->4835 4859 210aa68-210aaac call 2100a9f 4848->4859 4874 210aa5c 4859->4874 4875 210aaae 4859->4875 4877 210aa52 4874->4877 4878 210aa5e-210aa63 4874->4878 4875->4874 4876 210aab0-210aab8 4875->4876 4876->4859 4881 210aaba-210ab1d call 2100ba0 4876->4881 4877->4877 4889 210ab20-210ab29 4881->4889 4893 210ab2c 4889->4893 4894 210ab57-210ab5d 4893->4894 4895 210ab2e-210ab35 4893->4895 4900 210ab60-210ab62 4894->4900 4901 210ab38 4895->4901 4903 210ab63-210ab69 4900->4903 4901->4903 4904 210ab3a-210ab44 4901->4904 4909 210ab6c 4903->4909 4910 210ab46-210ab4d 4904->4910 4911 210ab6f-210ab70 4904->4911 4912 210ab97-210aba1 4909->4912 4913 210ab6e 4909->4913 4919 210ab54-210ab56 4910->4919 4911->4889 4914 210ab72 4911->4914 4920 210aba3-210aba6 4912->4920 4913->4911 4914->4889 4917 210ab74-210ab75 4914->4917 4921 210ab78 4917->4921 4919->4894 4920->4919 4924 210aba8-210abae 4920->4924 4921->4920 4922 210ab7a-210ab7c 4921->4922 4922->4893 4925 210ab7e 4922->4925 4928 210abaf-210abb0 4924->4928 4925->4893 4927 210ab80-210ab81 4925->4927 4929 210ab84 4927->4929 4928->4900 4930 210abb2 4928->4930 4929->4928 4931 210ab86-210ab88 4929->4931 4930->4900 4932 210abb4-210abbc 4930->4932 4931->4901 4933 210ab8a 4931->4933 4932->4909 4935 210abbe 4932->4935 4933->4901 4936 210ab8c-210ab95 4933->4936 4935->4909 4937 210abc0-210abc4 4935->4937 4936->4912 4938 210abc6-210abc8 4937->4938 4939 210abef-210ac42 call 2109075 4937->4939 4938->4921 4940 210abca 4938->4940 4947 210ac80-210acd0 call 2108b9d 4939->4947 4940->4921 4942 210abcc-210abd4 4940->4942 4942->4929 4946 210abd6 4942->4946 4946->4929 4948 210abd8-210abee call 210a2c5 4946->4948 4963 210acd2 4947->4963 4948->4939 4963->4947 4964 210acd4-210acd8 4963->4964 4965 210ad03-210ad0e 4964->4965 4966 210acda-210acdb 4964->4966 4967 210ad0f-210ad2c 4965->4967 4968 210acdc-210ace4 4966->4968 4967->4968 4976 210ad2e 4967->4976 4968->4967 4973 210ace6-210acf3 call 2109500 4968->4973 4976->4968 4978 210ad30-210ad40 4976->4978 4982 210ad42-210ad46 4978->4982 4983 210ad6b-210ad71 4978->4983 4986 210ad48-210ad4c 4982->4986 4987 210ad73-210ad76 4983->4987 4988 210ad45-210ad46 4983->4988 4989 210ad77-210ad89 4986->4989 4990 210ad4e-210ad50 4986->4990 4987->4989 4988->4986 4991 210ad00-210ad01 4990->4991 4992 210ad52 4990->4992 4991->4965 4992->4991 4994 210ad54-210ad58 4992->4994
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 491431ccaf5fb3c1c93eda3a28523ac2a9e3ed2e1f8e824b96de703640b9b7d0
          • Instruction ID: feeb2c52e5c835b5c7341afc871a295580ab73ba34a62832443893eb576921cb
          • Opcode Fuzzy Hash: 491431ccaf5fb3c1c93eda3a28523ac2a9e3ed2e1f8e824b96de703640b9b7d0
          • Instruction Fuzzy Hash: B2522171A44349DFDB389E34CD953EA7BB2BF46310F56822EDC999B290D3705A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 4995 21075a9-21075aa 4996 2107558 4995->4996 4997 21075ac-21075b0 4995->4997 4998 2107583-2107602 call 2108b94 4996->4998 4999 210755a-210756e 4996->4999 5000 21075b2-21075bc 4997->5000 5001 21075db-21075e5 4997->5001 5017 2107604-21076bc call 211079c 4998->5017 5014 2107570-2107581 4999->5014 5010 21075e7-2107602 5000->5010 5013 21075be-21075c0 5000->5013 5001->5010 5010->5017 5013->5014 5015 21075c2 5013->5015 5014->4998 5015->5014 5018 21075c4-21075d4 5015->5018 5031 21076c2-2107c1c call 2109068 call 21077cf call 210cd69 call 211079c 5017->5031 5032 21089f5-2108b89 call 211079c * 3 5017->5032 5028 21075d6-21075da 5018->5028 5029 21075ff-2107602 5018->5029 5028->5001 5029->5017 5059 210ce70-210ce93 5031->5059 5122 2107c22-2107c2f 5031->5122 5032->5059 5060 2108b8f-2108b90 5032->5060 5062 210ce99-210ceff 5059->5062 5063 2100dcb-2100e2b call 2100c2c 5059->5063 5062->5059 5069 210cf05-210cf20 5062->5069 5072 210cf26-210cf52 5069->5072 5073 211144d-2111453 5069->5073 5077 210d0f5-210d105 LoadLibraryA call 210d108 5072->5077 5078 210cf58-210cfbf call 210d822 5072->5078 5075 2111454-21114ce 5073->5075 5086 21114d0-21114d2 5075->5086 5078->5073 5091 210cfc5-210cfe3 5078->5091 5093 210d0a2-210d0f3 call 210d108 5091->5093 5094 210cfe9-210d08e call 210d822 call 210d04b 5091->5094 5093->5077 5094->5093 5111 210d090-210d09f call 210d822 5094->5111 5111->5093 5122->5032 5123 2107c35-2107c97 5122->5123 5123->5063 5126 2107c9d-2107e8a call 211079c 5123->5126 5126->5032 5138 2107e90-21081cc call 211079c call 21081a4 5126->5138 5138->5032 5156 21081d2-2108242 5138->5156 5156->5032 5158 2108248-210828c 5156->5158 5161 2108301-2108371 5158->5161 5162 210828e-21082fb 5158->5162 5161->5032 5168 2108377-2108544 5161->5168 5162->5032 5162->5161 5180 2100e30-2100f5b call 21114d9 call 210ce70 5168->5180 5181 210854a-21085cd call 210d463 5168->5181 5180->5059 5200 2100f61-210105b call 211079c call 210ce70 5180->5200 5181->5032 5195 21085d3-2108717 call 211144d NtWriteVirtualMemory 5181->5195 5195->5032 5218 210871d-210883a call 211079c 5195->5218 5219 210105d-21010e8 5200->5219 5218->5032 5239 2108840-2108901 call 211079c 5218->5239 5228 21070f2-21071ea 5219->5228 5229 21010ee-2101259 call 210d463 5219->5229 5229->5219 5262 210125f-210aa67 call 2101270 call 210aa51 5229->5262 5239->5032 5249 2108907-21089f2 call 211079c * 2 5239->5249 5273 210aa68-210aaac call 2100a9f 5262->5273 5288 210aa5c 5273->5288 5289 210aaae 5273->5289 5291 210aa52 5288->5291 5292 210aa5e-210aa63 5288->5292 5289->5288 5290 210aab0-210aab8 5289->5290 5290->5273 5295 210aaba-210ab1d call 2100ba0 5290->5295 5291->5291 5303 210ab20-210ab29 5295->5303 5307 210ab2c 5303->5307 5308 210ab57-210ab5d 5307->5308 5309 210ab2e-210ab35 5307->5309 5314 210ab60-210ab62 5308->5314 5315 210ab38 5309->5315 5317 210ab63-210ab69 5314->5317 5315->5317 5318 210ab3a-210ab44 5315->5318 5323 210ab6c 5317->5323 5324 210ab46-210ab4d 5318->5324 5325 210ab6f-210ab70 5318->5325 5326 210ab97-210aba1 5323->5326 5327 210ab6e 5323->5327 5333 210ab54-210ab56 5324->5333 5325->5303 5328 210ab72 5325->5328 5334 210aba3-210aba6 5326->5334 5327->5325 5328->5303 5331 210ab74-210ab75 5328->5331 5335 210ab78 5331->5335 5333->5308 5334->5333 5338 210aba8-210abae 5334->5338 5335->5334 5336 210ab7a-210ab7c 5335->5336 5336->5307 5339 210ab7e 5336->5339 5342 210abaf-210abb0 5338->5342 5339->5307 5341 210ab80-210ab81 5339->5341 5343 210ab84 5341->5343 5342->5314 5344 210abb2 5342->5344 5343->5342 5345 210ab86-210ab88 5343->5345 5344->5314 5346 210abb4-210abbc 5344->5346 5345->5315 5347 210ab8a 5345->5347 5346->5323 5349 210abbe 5346->5349 5347->5315 5350 210ab8c-210ab95 5347->5350 5349->5323 5351 210abc0-210abc4 5349->5351 5350->5326 5352 210abc6-210abc8 5351->5352 5353 210abef-210ac42 call 2109075 5351->5353 5352->5335 5354 210abca 5352->5354 5361 210ac80-210acd0 call 2108b9d 5353->5361 5354->5335 5356 210abcc-210abd4 5354->5356 5356->5343 5360 210abd6 5356->5360 5360->5343 5362 210abd8-210abee call 210a2c5 5360->5362 5377 210acd2 5361->5377 5362->5353 5377->5361 5378 210acd4-210acd8 5377->5378 5379 210ad03-210ad0e 5378->5379 5380 210acda-210acdb 5378->5380 5381 210ad0f-210ad2c 5379->5381 5382 210acdc-210ace4 5380->5382 5381->5382 5390 210ad2e 5381->5390 5382->5381 5387 210ace6-210acf3 call 2109500 5382->5387 5390->5382 5392 210ad30-210ad40 5390->5392 5396 210ad42-210ad46 5392->5396 5397 210ad6b-210ad71 5392->5397 5400 210ad48-210ad4c 5396->5400 5401 210ad73-210ad76 5397->5401 5402 210ad45-210ad46 5397->5402 5403 210ad77-210ad89 5400->5403 5404 210ad4e-210ad50 5400->5404 5401->5403 5402->5400 5405 210ad00-210ad01 5404->5405 5406 210ad52 5404->5406 5405->5379 5406->5405 5408 210ad54-210ad58 5406->5408
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 3849699429617068fb9ff99a1eb52ccd5ec142d90cfe08b6c0233e40835e3cad
          • Instruction ID: cc31f0a4903d9c9ede07a382b4527824145a443511fc9a3612fc8596d5edba5c
          • Opcode Fuzzy Hash: 3849699429617068fb9ff99a1eb52ccd5ec142d90cfe08b6c0233e40835e3cad
          • Instruction Fuzzy Hash: A4521071644349DFDB388E34CD957EA7BA2FF46310F56822EDC999B290D3705A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c$}(iy
          • API String ID: 0-2965748852
          • Opcode ID: 355419527b6313388a34171c4a2eacd6fe300ff4070aa9998af7be0f01cf9b06
          • Instruction ID: 92358a2af75fe311d276eb3fed48de136b0c8034877f343b21d7a44892bf177b
          • Opcode Fuzzy Hash: 355419527b6313388a34171c4a2eacd6fe300ff4070aa9998af7be0f01cf9b06
          • Instruction Fuzzy Hash: 93425B72A84385EFDB349E398CD43DA3BB1BF95350F9A411ADC9D8B191C7B88585CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: dae18bd0ea2e136f9bebb788f6b011fbb99dcb9c5ea1db10311f32e323b4240c
          • Instruction ID: b6bed802c62e46c3bf4cd228fae456c5dc1ab250deead7563a6c372b24e7027d
          • Opcode Fuzzy Hash: dae18bd0ea2e136f9bebb788f6b011fbb99dcb9c5ea1db10311f32e323b4240c
          • Instruction Fuzzy Hash: 41522571A44345DFDB389E38CD853EABBB2FF85340F56822ADC999B290D3705985CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 6317 210762b-2107630 6318 21075e0-21075eb 6317->6318 6319 2107632 6317->6319 6325 21075ec-21075f4 6318->6325 6319->6318 6321 2107634-2107638 6319->6321 6323 2107663-2107665 6321->6323 6324 210763a-210763c 6321->6324 6326 2107666-2107669 6323->6326 6324->6325 6327 210763e 6324->6327 6328 21075f8-2107602 6325->6328 6330 210766f-21076b6 call 211079c 6326->6330 6327->6325 6329 2107640-2107644 6327->6329 6331 2107604-2107628 6328->6331 6329->6330 6332 2107646-2107648 6329->6332 6337 21076bc 6330->6337 6331->6326 6332->6328 6334 210764a 6332->6334 6334->6328 6336 210764c-2107650 6334->6336 6340 2107652-2107654 6336->6340 6341 210767b-2107680 6336->6341 6338 21076c2-2107c1c call 2109068 call 21077cf call 210cd69 call 211079c 6337->6338 6339 21089f5-2108b89 call 211079c * 3 6337->6339 6372 210ce70-210ce93 6338->6372 6435 2107c22-2107c2f 6338->6435 6339->6372 6373 2108b8f-2108b90 6339->6373 6340->6331 6345 2107656 6340->6345 6344 2107687-21076b6 6341->6344 6344->6337 6345->6331 6348 2107658-210765c 6345->6348 6348->6344 6349 210765e-2107662 6348->6349 6349->6323 6375 210ce99-210ceff 6372->6375 6376 2100dcb-2100e2b call 2100c2c 6372->6376 6375->6372 6382 210cf05-210cf20 6375->6382 6385 210cf26-210cf52 6382->6385 6386 211144d-2111453 6382->6386 6390 210d0f5-210d105 LoadLibraryA call 210d108 6385->6390 6391 210cf58-210cfbf call 210d822 6385->6391 6388 2111454-21114ce 6386->6388 6399 21114d0-21114d2 6388->6399 6391->6386 6404 210cfc5-210cfe3 6391->6404 6406 210d0a2-210d0f3 call 210d108 6404->6406 6407 210cfe9-210d08e call 210d822 call 210d04b 6404->6407 6406->6390 6407->6406 6424 210d090-210d09f call 210d822 6407->6424 6424->6406 6435->6339 6436 2107c35-2107c97 6435->6436 6436->6376 6439 2107c9d-2107e8a call 211079c 6436->6439 6439->6339 6451 2107e90-21081cc call 211079c call 21081a4 6439->6451 6451->6339 6469 21081d2-2108242 6451->6469 6469->6339 6471 2108248-210828c 6469->6471 6474 2108301-2108371 6471->6474 6475 210828e-21082fb 6471->6475 6474->6339 6481 2108377-2108544 6474->6481 6475->6339 6475->6474 6493 2100e30-2100f5b call 21114d9 call 210ce70 6481->6493 6494 210854a-21085cd call 210d463 6481->6494 6493->6372 6513 2100f61-210105b call 211079c call 210ce70 6493->6513 6494->6339 6508 21085d3-2108717 call 211144d NtWriteVirtualMemory 6494->6508 6508->6339 6531 210871d-210883a call 211079c 6508->6531 6532 210105d-21010e8 6513->6532 6531->6339 6552 2108840-2108901 call 211079c 6531->6552 6541 21070f2-21071ea 6532->6541 6542 21010ee-2101259 call 210d463 6532->6542 6542->6532 6575 210125f-210aa67 call 2101270 call 210aa51 6542->6575 6552->6339 6562 2108907-21089f2 call 211079c * 2 6552->6562 6586 210aa68-210aaac call 2100a9f 6575->6586 6601 210aa5c 6586->6601 6602 210aaae 6586->6602 6604 210aa52 6601->6604 6605 210aa5e-210aa63 6601->6605 6602->6601 6603 210aab0-210aab8 6602->6603 6603->6586 6608 210aaba-210ab1d call 2100ba0 6603->6608 6604->6604 6616 210ab20-210ab29 6608->6616 6620 210ab2c 6616->6620 6621 210ab57-210ab5d 6620->6621 6622 210ab2e-210ab35 6620->6622 6627 210ab60-210ab62 6621->6627 6628 210ab38 6622->6628 6630 210ab63-210ab69 6627->6630 6628->6630 6631 210ab3a-210ab44 6628->6631 6636 210ab6c 6630->6636 6637 210ab46-210ab4d 6631->6637 6638 210ab6f-210ab70 6631->6638 6639 210ab97-210aba1 6636->6639 6640 210ab6e 6636->6640 6646 210ab54-210ab56 6637->6646 6638->6616 6641 210ab72 6638->6641 6647 210aba3-210aba6 6639->6647 6640->6638 6641->6616 6644 210ab74-210ab75 6641->6644 6648 210ab78 6644->6648 6646->6621 6647->6646 6651 210aba8-210abae 6647->6651 6648->6647 6649 210ab7a-210ab7c 6648->6649 6649->6620 6652 210ab7e 6649->6652 6655 210abaf-210abb0 6651->6655 6652->6620 6654 210ab80-210ab81 6652->6654 6656 210ab84 6654->6656 6655->6627 6657 210abb2 6655->6657 6656->6655 6658 210ab86-210ab88 6656->6658 6657->6627 6659 210abb4-210abbc 6657->6659 6658->6628 6660 210ab8a 6658->6660 6659->6636 6662 210abbe 6659->6662 6660->6628 6663 210ab8c-210ab95 6660->6663 6662->6636 6664 210abc0-210abc4 6662->6664 6663->6639 6665 210abc6-210abc8 6664->6665 6666 210abef-210ac42 call 2109075 6664->6666 6665->6648 6667 210abca 6665->6667 6674 210ac80-210acd0 call 2108b9d 6666->6674 6667->6648 6669 210abcc-210abd4 6667->6669 6669->6656 6673 210abd6 6669->6673 6673->6656 6675 210abd8-210abee call 210a2c5 6673->6675 6690 210acd2 6674->6690 6675->6666 6690->6674 6691 210acd4-210acd8 6690->6691 6692 210ad03-210ad0e 6691->6692 6693 210acda-210acdb 6691->6693 6694 210ad0f-210ad2c 6692->6694 6695 210acdc-210ace4 6693->6695 6694->6695 6703 210ad2e 6694->6703 6695->6694 6700 210ace6-210acf3 call 2109500 6695->6700 6703->6695 6705 210ad30-210ad40 6703->6705 6709 210ad42-210ad46 6705->6709 6710 210ad6b-210ad71 6705->6710 6713 210ad48-210ad4c 6709->6713 6714 210ad73-210ad76 6710->6714 6715 210ad45-210ad46 6710->6715 6716 210ad77-210ad89 6713->6716 6717 210ad4e-210ad50 6713->6717 6714->6716 6715->6713 6718 210ad00-210ad01 6717->6718 6719 210ad52 6717->6719 6718->6692 6719->6718 6721 210ad54-210ad58 6719->6721
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 25e713216228ddab9e6da5dcb6b2926bc5df786d58b99402b4e79da85719c48d
          • Instruction ID: f207ae5c5d52e30f3e1668a3181c283f48f05e4b4405b53a268c2ac84b69bda8
          • Opcode Fuzzy Hash: 25e713216228ddab9e6da5dcb6b2926bc5df786d58b99402b4e79da85719c48d
          • Instruction Fuzzy Hash: CB523371644349DFDB388E38CD953EA7BB2FF46310F56822ACC999B290D3705A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 6722 2107801-2107802 6723 21077b0-21077bb 6722->6723 6724 2107804-2107808 6722->6724 6726 2107833-2107838 6724->6726 6727 210780a-210780c 6724->6727 6735 2107863-2107877 6726->6735 6736 210783a-2107855 6726->6736 6729 21077bc-21077c6 6727->6729 6730 210780e 6727->6730 6737 21077c8-21077d3 6729->6737 6730->6729 6732 2107810-2107818 6730->6732 6732->6737 6738 210781a 6732->6738 6739 21078b5-2107c1c call 211079c 6735->6739 6743 2107857-2107877 call 210cd69 6736->6743 6742 21077d4-21077dd 6737->6742 6738->6737 6741 210781c-2107824 6738->6741 6777 210ce70-210ce93 6739->6777 6778 2107c22-2107c2f 6739->6778 6741->6742 6749 2107826 6741->6749 6743->6739 6749->6742 6752 2107828-210782c 6749->6752 6752->6743 6756 210782e-2107830 6752->6756 6758 21077e0-21077ee 6756->6758 6759 2107832 6756->6759 6758->6722 6759->6726 6759->6758 6779 210ce99-210ceff 6777->6779 6780 2100dcb-2100e2b call 2100c2c 6777->6780 6781 21089f5-2108b89 call 211079c * 3 6778->6781 6782 2107c35-2107c97 6778->6782 6779->6777 6788 210cf05-210cf20 6779->6788 6781->6777 6837 2108b8f-2108b90 6781->6837 6782->6780 6794 2107c9d-2107e8a call 211079c 6782->6794 6792 210cf26-210cf52 6788->6792 6793 211144d-2111453 6788->6793 6798 210d0f5-210d105 LoadLibraryA call 210d108 6792->6798 6799 210cf58-210cfbf call 210d822 6792->6799 6796 2111454-21114ce 6793->6796 6794->6781 6841 2107e90-21081cc call 211079c call 21081a4 6794->6841 6809 21114d0-21114d2 6796->6809 6799->6793 6816 210cfc5-210cfe3 6799->6816 6819 210d0a2-210d0f3 call 210d108 6816->6819 6820 210cfe9-210d08e call 210d822 call 210d04b 6816->6820 6819->6798 6820->6819 6842 210d090-210d09f call 210d822 6820->6842 6841->6781 6862 21081d2-2108242 6841->6862 6842->6819 6862->6781 6864 2108248-210828c 6862->6864 6867 2108301-2108371 6864->6867 6868 210828e-21082fb 6864->6868 6867->6781 6874 2108377-2108544 6867->6874 6868->6781 6868->6867 6886 2100e30-2100f5b call 21114d9 call 210ce70 6874->6886 6887 210854a-21085cd call 210d463 6874->6887 6886->6777 6906 2100f61-210105b call 211079c call 210ce70 6886->6906 6887->6781 6901 21085d3-2108717 call 211144d NtWriteVirtualMemory 6887->6901 6901->6781 6924 210871d-210883a call 211079c 6901->6924 6925 210105d-21010e8 6906->6925 6924->6781 6945 2108840-2108901 call 211079c 6924->6945 6934 21070f2-21071ea 6925->6934 6935 21010ee-2101259 call 210d463 6925->6935 6935->6925 6968 210125f-210aa67 call 2101270 call 210aa51 6935->6968 6945->6781 6955 2108907-21089f2 call 211079c * 2 6945->6955 6979 210aa68-210aaac call 2100a9f 6968->6979 6994 210aa5c 6979->6994 6995 210aaae 6979->6995 6997 210aa52 6994->6997 6998 210aa5e-210aa63 6994->6998 6995->6994 6996 210aab0-210aab8 6995->6996 6996->6979 7001 210aaba-210ab1d call 2100ba0 6996->7001 6997->6997 7009 210ab20-210ab29 7001->7009 7013 210ab2c 7009->7013 7014 210ab57-210ab5d 7013->7014 7015 210ab2e-210ab35 7013->7015 7020 210ab60-210ab62 7014->7020 7021 210ab38 7015->7021 7023 210ab63-210ab69 7020->7023 7021->7023 7024 210ab3a-210ab44 7021->7024 7029 210ab6c 7023->7029 7030 210ab46-210ab4d 7024->7030 7031 210ab6f-210ab70 7024->7031 7032 210ab97-210aba1 7029->7032 7033 210ab6e 7029->7033 7039 210ab54-210ab56 7030->7039 7031->7009 7034 210ab72 7031->7034 7040 210aba3-210aba6 7032->7040 7033->7031 7034->7009 7037 210ab74-210ab75 7034->7037 7041 210ab78 7037->7041 7039->7014 7040->7039 7044 210aba8-210abae 7040->7044 7041->7040 7042 210ab7a-210ab7c 7041->7042 7042->7013 7045 210ab7e 7042->7045 7048 210abaf-210abb0 7044->7048 7045->7013 7047 210ab80-210ab81 7045->7047 7049 210ab84 7047->7049 7048->7020 7050 210abb2 7048->7050 7049->7048 7051 210ab86-210ab88 7049->7051 7050->7020 7052 210abb4-210abbc 7050->7052 7051->7021 7053 210ab8a 7051->7053 7052->7029 7055 210abbe 7052->7055 7053->7021 7056 210ab8c-210ab95 7053->7056 7055->7029 7057 210abc0-210abc4 7055->7057 7056->7032 7058 210abc6-210abc8 7057->7058 7059 210abef-210ac42 call 2109075 7057->7059 7058->7041 7060 210abca 7058->7060 7067 210ac80-210acd0 call 2108b9d 7059->7067 7060->7041 7062 210abcc-210abd4 7060->7062 7062->7049 7066 210abd6 7062->7066 7066->7049 7068 210abd8-210abee call 210a2c5 7066->7068 7083 210acd2 7067->7083 7068->7059 7083->7067 7084 210acd4-210acd8 7083->7084 7085 210ad03-210ad0e 7084->7085 7086 210acda-210acdb 7084->7086 7087 210ad0f-210ad2c 7085->7087 7088 210acdc-210ace4 7086->7088 7087->7088 7096 210ad2e 7087->7096 7088->7087 7093 210ace6-210acf3 call 2109500 7088->7093 7096->7088 7098 210ad30-210ad40 7096->7098 7102 210ad42-210ad46 7098->7102 7103 210ad6b-210ad71 7098->7103 7106 210ad48-210ad4c 7102->7106 7107 210ad73-210ad76 7103->7107 7108 210ad45-210ad46 7103->7108 7109 210ad77-210ad89 7106->7109 7110 210ad4e-210ad50 7106->7110 7107->7109 7108->7106 7111 210ad00-210ad01 7110->7111 7112 210ad52 7110->7112 7111->7085 7112->7111 7114 210ad54-210ad58 7112->7114
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 879e865bba87125553f920dd3d45c77c6b8f91be39651427e3dad00712805efe
          • Instruction ID: ee7dbf87c684d69c4fed237ef86b83561e9d347a65ec4c14b2c452ee7b3c4c6d
          • Opcode Fuzzy Hash: 879e865bba87125553f920dd3d45c77c6b8f91be39651427e3dad00712805efe
          • Instruction Fuzzy Hash: C7423472644345DFDB389E34CD853EA7BB2FF85310F56822ADC999B290D3B05A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 7115 2107903-2107908 7116 21078b8-21078d9 7115->7116 7117 210790a 7115->7117 7124 21078dc-21078e2 7116->7124 7117->7116 7119 210790c-2107910 7117->7119 7121 2107912-210791c 7119->7121 7122 210793b-210793d 7119->7122 7128 2107947-210794e 7121->7128 7129 210791e-2107928 7121->7129 7125 210793e-2107940 7122->7125 7127 21078e8-2107900 7124->7127 7125->7128 7127->7125 7130 2107953-2107c1c call 211079c 7128->7130 7129->7130 7135 210792a-210792c 7129->7135 7155 210ce70-210ce93 7130->7155 7156 2107c22-2107c2f 7130->7156 7135->7124 7137 210792e 7135->7137 7137->7124 7139 2107930-2107938 7137->7139 7139->7127 7143 210793a 7139->7143 7143->7122 7143->7127 7157 210ce99-210ceff 7155->7157 7158 2100dcb-2100e2b call 2100c2c 7155->7158 7159 21089f5-2108b89 call 211079c * 3 7156->7159 7160 2107c35-2107c97 7156->7160 7157->7155 7166 210cf05-210cf20 7157->7166 7159->7155 7215 2108b8f-2108b90 7159->7215 7160->7158 7172 2107c9d-2107e8a call 211079c 7160->7172 7170 210cf26-210cf52 7166->7170 7171 211144d-2111453 7166->7171 7176 210d0f5-210d105 LoadLibraryA call 210d108 7170->7176 7177 210cf58-210cfbf call 210d822 7170->7177 7174 2111454-21114ce 7171->7174 7172->7159 7219 2107e90-21081cc call 211079c call 21081a4 7172->7219 7187 21114d0-21114d2 7174->7187 7177->7171 7194 210cfc5-210cfe3 7177->7194 7197 210d0a2-210d0f3 call 210d108 7194->7197 7198 210cfe9-210d08e call 210d822 call 210d04b 7194->7198 7197->7176 7198->7197 7220 210d090-210d09f call 210d822 7198->7220 7219->7159 7240 21081d2-2108242 7219->7240 7220->7197 7240->7159 7242 2108248-210828c 7240->7242 7245 2108301-2108371 7242->7245 7246 210828e-21082fb 7242->7246 7245->7159 7252 2108377-2108544 7245->7252 7246->7159 7246->7245 7264 2100e30-2100f5b call 21114d9 call 210ce70 7252->7264 7265 210854a-21085cd call 210d463 7252->7265 7264->7155 7284 2100f61-210105b call 211079c call 210ce70 7264->7284 7265->7159 7279 21085d3-2108717 call 211144d NtWriteVirtualMemory 7265->7279 7279->7159 7302 210871d-210883a call 211079c 7279->7302 7303 210105d-21010e8 7284->7303 7302->7159 7323 2108840-2108901 call 211079c 7302->7323 7312 21070f2-21071ea 7303->7312 7313 21010ee-2101259 call 210d463 7303->7313 7313->7303 7346 210125f-210aa67 call 2101270 call 210aa51 7313->7346 7323->7159 7333 2108907-21089f2 call 211079c * 2 7323->7333 7357 210aa68-210aaac call 2100a9f 7346->7357 7372 210aa5c 7357->7372 7373 210aaae 7357->7373 7375 210aa52 7372->7375 7376 210aa5e-210aa63 7372->7376 7373->7372 7374 210aab0-210aab8 7373->7374 7374->7357 7379 210aaba-210ab1d call 2100ba0 7374->7379 7375->7375 7387 210ab20-210ab29 7379->7387 7391 210ab2c 7387->7391 7392 210ab57-210ab5d 7391->7392 7393 210ab2e-210ab35 7391->7393 7398 210ab60-210ab62 7392->7398 7399 210ab38 7393->7399 7401 210ab63-210ab69 7398->7401 7399->7401 7402 210ab3a-210ab44 7399->7402 7407 210ab6c 7401->7407 7408 210ab46-210ab4d 7402->7408 7409 210ab6f-210ab70 7402->7409 7410 210ab97-210aba1 7407->7410 7411 210ab6e 7407->7411 7417 210ab54-210ab56 7408->7417 7409->7387 7412 210ab72 7409->7412 7418 210aba3-210aba6 7410->7418 7411->7409 7412->7387 7415 210ab74-210ab75 7412->7415 7419 210ab78 7415->7419 7417->7392 7418->7417 7422 210aba8-210abae 7418->7422 7419->7418 7420 210ab7a-210ab7c 7419->7420 7420->7391 7423 210ab7e 7420->7423 7426 210abaf-210abb0 7422->7426 7423->7391 7425 210ab80-210ab81 7423->7425 7427 210ab84 7425->7427 7426->7398 7428 210abb2 7426->7428 7427->7426 7429 210ab86-210ab88 7427->7429 7428->7398 7430 210abb4-210abbc 7428->7430 7429->7399 7431 210ab8a 7429->7431 7430->7407 7433 210abbe 7430->7433 7431->7399 7434 210ab8c-210ab95 7431->7434 7433->7407 7435 210abc0-210abc4 7433->7435 7434->7410 7436 210abc6-210abc8 7435->7436 7437 210abef-210ac42 call 2109075 7435->7437 7436->7419 7438 210abca 7436->7438 7445 210ac80-210acd0 call 2108b9d 7437->7445 7438->7419 7440 210abcc-210abd4 7438->7440 7440->7427 7444 210abd6 7440->7444 7444->7427 7446 210abd8-210abee call 210a2c5 7444->7446 7461 210acd2 7445->7461 7446->7437 7461->7445 7462 210acd4-210acd8 7461->7462 7463 210ad03-210ad0e 7462->7463 7464 210acda-210acdb 7462->7464 7465 210ad0f-210ad2c 7463->7465 7466 210acdc-210ace4 7464->7466 7465->7466 7474 210ad2e 7465->7474 7466->7465 7471 210ace6-210acf3 call 2109500 7466->7471 7474->7466 7476 210ad30-210ad40 7474->7476 7480 210ad42-210ad46 7476->7480 7481 210ad6b-210ad71 7476->7481 7484 210ad48-210ad4c 7480->7484 7485 210ad73-210ad76 7481->7485 7486 210ad45-210ad46 7481->7486 7487 210ad77-210ad89 7484->7487 7488 210ad4e-210ad50 7484->7488 7485->7487 7486->7484 7489 210ad00-210ad01 7488->7489 7490 210ad52 7488->7490 7489->7463 7490->7489 7492 210ad54-210ad58 7490->7492
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 2beae54deb998bab49cae9587f6d24ac0d589ebae404d2bc60c73690a10b2f31
          • Instruction ID: ffdf43e1c318ff6b0b562c68228128aa36013adf234f7e98022bbc38c11980d1
          • Opcode Fuzzy Hash: 2beae54deb998bab49cae9587f6d24ac0d589ebae404d2bc60c73690a10b2f31
          • Instruction Fuzzy Hash: 83323471644349DFDB389E34CD853EA7BB2FF46350F56822ADC999B284C3B05A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 662ba7064c2d8fd0e20c4ddbb6a00be097b784beab0c99f33826bc74a1d0cabc
          • Instruction ID: 0d23b76f3f3afdbbc88f9c3fe60793cd4befbe6a1e23ee86d730fd8c63622e58
          • Opcode Fuzzy Hash: 662ba7064c2d8fd0e20c4ddbb6a00be097b784beab0c99f33826bc74a1d0cabc
          • Instruction Fuzzy Hash: AF322171644349DFDB389E38CD853EA7BB2FF45310F56822ADC999B294C3B05A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 306d862f93f6235a11ba0ff3ca5f604bc3e6828482f376d21e660d2ef4f0aa80
          • Instruction ID: c2ad65e699c25e54f821a9bc73d95682d481afcc4b65511345f4ab23d2fb0afb
          • Opcode Fuzzy Hash: 306d862f93f6235a11ba0ff3ca5f604bc3e6828482f376d21e660d2ef4f0aa80
          • Instruction Fuzzy Hash: 48323171644349DFDB389E34CD957EA7BB2BF46310F56822ADC999B240D3B09A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$WfiM$k $z:w$z:w
          • API String ID: 0-1615776370
          • Opcode ID: 087b9b90ba683373e5cbeb78e6b2db440a7611b75a87943e2b3d07aafb048a28
          • Instruction ID: f22f434f5de52145e16787730ad05014cee9c12c45abd7e53c4f47e0c8366d78
          • Opcode Fuzzy Hash: 087b9b90ba683373e5cbeb78e6b2db440a7611b75a87943e2b3d07aafb048a28
          • Instruction Fuzzy Hash: 81223171648349DFDB388E34CD857EA7BB2BF46310F56812EDC9A9B254C3B05A81CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c$}(iy
          • API String ID: 0-2965748852
          • Opcode ID: c45db323f73eeb6ed003667b40a7a817f02f3f41129aab2440c67f58fa89eb2c
          • Instruction ID: fa617aa9eb40c1d0182d53e1f23eeed5997c679f397dc4383dfd6d2fbe9b895e
          • Opcode Fuzzy Hash: c45db323f73eeb6ed003667b40a7a817f02f3f41129aab2440c67f58fa89eb2c
          • Instruction Fuzzy Hash: 99024775A84349DFDF389E2989D47EE37A2BF95340F96412ADC8DC7294C3B48985CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c$}(iy
          • API String ID: 0-2965748852
          • Opcode ID: cee4921fec771dc4006f7d9aa12e1a0901922a0fd08324371b71256a4bb54594
          • Instruction ID: 33f28e4c2b0c56f6402c5101b405338000f4a5fa23e4d65d2bdfd1338ebb691b
          • Opcode Fuzzy Hash: cee4921fec771dc4006f7d9aa12e1a0901922a0fd08324371b71256a4bb54594
          • Instruction Fuzzy Hash: 30024971A84349DFDF349E6988D47EE37A2BF55340F95412EDC8E8B284D3B58981CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c$}(iy
          • API String ID: 0-2965748852
          • Opcode ID: ec4a8098c09d2b1cffb95d26205f15e5c7f9a63bd552ea68f7e329d2112723a0
          • Instruction ID: 7241b9be41c4a82265a225242c398851f4786831b5c7ae54312a3c648fa0bb7b
          • Opcode Fuzzy Hash: ec4a8098c09d2b1cffb95d26205f15e5c7f9a63bd552ea68f7e329d2112723a0
          • Instruction Fuzzy Hash: A1025975A84349DFDF389E2989E47EE37A2BF95340F95412EDC8D87294C3B58981CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c$}(iy
          • API String ID: 0-2965748852
          • Opcode ID: a01373dfd41e829656b40e6b594e252949f72b53aaaa5cc1577796b83631a288
          • Instruction ID: d3e5010fa47d8f82b0472792164be524515a3af51e3099c3ba794de97217f08d
          • Opcode Fuzzy Hash: a01373dfd41e829656b40e6b594e252949f72b53aaaa5cc1577796b83631a288
          • Instruction Fuzzy Hash: 69F16775A84349DFDB389E698CD47EE37A2BF95340F96412ECC9E87284C3B48581CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 1859f306ce3b7ad0db00f6ca9de515f4530d313450a188876dd51269274578bf
          • Instruction ID: a10a5172bf1d5fef67317eded34fea85722aa10275fd54e4d75ecd002968a6e9
          • Opcode Fuzzy Hash: 1859f306ce3b7ad0db00f6ca9de515f4530d313450a188876dd51269274578bf
          • Instruction Fuzzy Hash: 76326A71A44349DFEB359E34CD853EA7BB2FF86300F56412ADC899B191D3B05A86CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: c67f662ec7a0e7888496115138e1b1e022f2d559090ca7cfb537d53db97ab7cd
          • Instruction ID: 914c00f90822c502f3a55e51b63728857b88eded931f382e2f12bed8fe6f75dc
          • Opcode Fuzzy Hash: c67f662ec7a0e7888496115138e1b1e022f2d559090ca7cfb537d53db97ab7cd
          • Instruction Fuzzy Hash: 30224571644349DFDB389E38CD953EA7BB2FF85310F56412ADC999B294C3B05A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 7602f59a66480140a666552f49a49e0b789799683fddab8fb85ec2d569e8838e
          • Instruction ID: 28e36a06e01ca0df37dc1fa0cad6b4066b991ec6c1fefccd739a7e5abb8d41e0
          • Opcode Fuzzy Hash: 7602f59a66480140a666552f49a49e0b789799683fddab8fb85ec2d569e8838e
          • Instruction Fuzzy Hash: 12224471A48348DFDB389E34CD957EA7BB2FF46310F56412ADC899B284C3B04A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 72f7264e968c4e45c28607a34f940fd109491da8681ea61842da7ebb88a0fe31
          • Instruction ID: 840d298c081494528f9df391f413d5c51684430e944105854ecf352cd0bff640
          • Opcode Fuzzy Hash: 72f7264e968c4e45c28607a34f940fd109491da8681ea61842da7ebb88a0fe31
          • Instruction Fuzzy Hash: 0D124471A48349DFDB399E34CD953EA7BB2FF46300F56412ADC999B291D3B04A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 5848124733bafbc167a63087e2251dde413cc507249864a2b09aa0ab563c0232
          • Instruction ID: 0fbec0d6e65199be67e30fcc6598946c5dd46b5d9f9ae4f83a675044293d9fae
          • Opcode Fuzzy Hash: 5848124733bafbc167a63087e2251dde413cc507249864a2b09aa0ab563c0232
          • Instruction Fuzzy Hash: 9C125471A48348DFDB399E34CD857EA7BB2FF56300F56412ADC899B281D3B05A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 6ac8043605c8569ec57b0d3d32d899c7a157e3036ce8ed4f199e5f3a7740ff99
          • Instruction ID: 1d5c6984c01195c244735fe204239712d1e59edac7f8e0932e91be95d4e10ab2
          • Opcode Fuzzy Hash: 6ac8043605c8569ec57b0d3d32d899c7a157e3036ce8ed4f199e5f3a7740ff99
          • Instruction Fuzzy Hash: 19024471648348DFDB399E38CD957EA7BB2FF46300F56412ACC999B181D3B05A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c
          • API String ID: 0-2362888104
          • Opcode ID: 0e94e2abdae98fe99f52a61de2306573a31aa69b9e716f9bc1b353a24160c98f
          • Instruction ID: 81d976c6584b458c12362c1a4d527989de71a9e00540af174a862f353d2cad24
          • Opcode Fuzzy Hash: 0e94e2abdae98fe99f52a61de2306573a31aa69b9e716f9bc1b353a24160c98f
          • Instruction Fuzzy Hash: EAF15771A84349EFDB389E798CD47DA37A2BF95300F9A411EDC9D87284D7B48581CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c
          • API String ID: 0-2362888104
          • Opcode ID: 247caba861ac19f992588a9472e1b2322980ac14395dd5c9547ed7e263283f7f
          • Instruction ID: a434bc4bb7b419140ebbf9b898f0591f95f3f019cf88760a6ebe0f5132c650e3
          • Opcode Fuzzy Hash: 247caba861ac19f992588a9472e1b2322980ac14395dd5c9547ed7e263283f7f
          • Instruction Fuzzy Hash: 29F16775A84349EFEB389E798CD47DA37A2BF95340F96411EDC8D87280D7B48681CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul$c
          • API String ID: 0-2362888104
          • Opcode ID: a2f5a1cffe3942ac3628c37540bf7104cab0964aaf0da93a90643fe8b43bb8f3
          • Instruction ID: 3ec243bb56f6ca433389efcd22abbb91481b831151b11b4e30f706616f33fec3
          • Opcode Fuzzy Hash: a2f5a1cffe3942ac3628c37540bf7104cab0964aaf0da93a90643fe8b43bb8f3
          • Instruction Fuzzy Hash: C9F15975A84349DFDB349E798CD47DA37A2BF96340F96411EDC8D9B284C3B48A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: b72102190e4abb7dccd62cd52d9e63f50141911eaeb0500ae433ec9a3210beca
          • Instruction ID: 8d69cbe81239e339380b4b8753f88389a5fcb16b64dcf6cacbc5049be3f76b1d
          • Opcode Fuzzy Hash: b72102190e4abb7dccd62cd52d9e63f50141911eaeb0500ae433ec9a3210beca
          • Instruction Fuzzy Hash: FB023271A48349DFDB389E34CD957EA7BB2FF46300F56412ADC899B291D3B04A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 0d7fbdf2b75abb3d1fdb98fcacc39181230923df28d3d3653a931c766cebc2b1
          • Instruction ID: e0509d4b27ce0989173ceee7218d163e1003a978fb1e4ca79ef8056e8d84dcd6
          • Opcode Fuzzy Hash: 0d7fbdf2b75abb3d1fdb98fcacc39181230923df28d3d3653a931c766cebc2b1
          • Instruction Fuzzy Hash: BD023471648388DFDB399E38CD953EA7BB2FF46300F56412ADC899B291D3704A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: ecb22ecafee0a56027cc69e833646217ce1149c5692d459b84263a05246a3fdd
          • Instruction ID: 9cfb60c64e9ee24cffb4a850fce9de1944a36413aa44fdbc957b530d5ec3fa7e
          • Opcode Fuzzy Hash: ecb22ecafee0a56027cc69e833646217ce1149c5692d459b84263a05246a3fdd
          • Instruction Fuzzy Hash: 53F13372A48349DFDB398E34CD957EA3BB2FF96300F56412ADC999B185C7704A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 4c372bffbca2b96e03d33cb60df2fd7afea14aab2f2edebf0bb1b96eda66ec02
          • Instruction ID: 7ac19e451675f303b1eaf03a0273d1e95ea03579208666cd0f93f478c563dcd7
          • Opcode Fuzzy Hash: 4c372bffbca2b96e03d33cb60df2fd7afea14aab2f2edebf0bb1b96eda66ec02
          • Instruction Fuzzy Hash: A1F14371644388DFDB399E38CD953EA7BB2FF86300F56412ADC999B291C3704A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 68ca1a3cc4113ebe1854cd43ecdc6b9ff7394ba449619958a80766a41bd2338b
          • Instruction ID: 97a4e7c9e484b81df7cd0d01a7f740361538ee2da02c2c810633b7776f1b47bc
          • Opcode Fuzzy Hash: 68ca1a3cc4113ebe1854cd43ecdc6b9ff7394ba449619958a80766a41bd2338b
          • Instruction Fuzzy Hash: 8EF12071648348DFDB399E34CD957EA37B2BF46300F56812ADC8A9B255D7B04A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 7c8d4fe09736ddb88059be057372ed55b0b688b063b23e9be5428a0aaecf9af2
          • Instruction ID: b9c2dc209fab917152e68b680e24b5e08ed0f845255a1d0de2271bfe35d51932
          • Opcode Fuzzy Hash: 7c8d4fe09736ddb88059be057372ed55b0b688b063b23e9be5428a0aaecf9af2
          • Instruction Fuzzy Hash: 29F11F71648348DFDF399E38CD957EA37B2FF46300F56812ADC8A9B255D7704A858B02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: e0efe26034ee20061c228746cf437d85826cbd7904a0dcc474fb971931c28974
          • Instruction ID: edfa997684db7313f129b95a54cace990e17f642ed062607940d8589ceaf78ec
          • Opcode Fuzzy Hash: e0efe26034ee20061c228746cf437d85826cbd7904a0dcc474fb971931c28974
          • Instruction Fuzzy Hash: 9BE14371A48388DFDB399E34CD957EA37B2FF86300F56422ADC998B195C7704A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 4e4dbfa2a4e11d71c093bad12e97ba89122444e4f9bc25f3639bb6d9940e751f
          • Instruction ID: 2e8bab324e8295c360ea32d7ce976e8c0170d08d08f784bd641dd6f34bb39f65
          • Opcode Fuzzy Hash: 4e4dbfa2a4e11d71c093bad12e97ba89122444e4f9bc25f3639bb6d9940e751f
          • Instruction Fuzzy Hash: 03E13571A48389DFDB399E38CD957EA3BB2FF45300F56412ADC895B241C7704A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 8b0bc49c9f0775d7f3a15a9621a61b065c89351b13364b68e38445fe50e98fe0
          • Instruction ID: b2007e3edfd8f9a3a5afca38194288a1f0be28ee3667f5b94e5f93280195d64d
          • Opcode Fuzzy Hash: 8b0bc49c9f0775d7f3a15a9621a61b065c89351b13364b68e38445fe50e98fe0
          • Instruction Fuzzy Hash: 4DD10471A48388DFDB399F38CD997EA37B2FF95300F5A411ADC995B241C7704A858B42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: d67b8721045dca7b98d354564b4ad6aa1475290939f1c614a89734dc1226a36c
          • Instruction ID: 3e805ce69f4257428e3fe9d8c422fa1a453c6cf2fae076a5d089ecde3780ea31
          • Opcode Fuzzy Hash: d67b8721045dca7b98d354564b4ad6aa1475290939f1c614a89734dc1226a36c
          • Instruction Fuzzy Hash: 2CD11571A48788DFDB399E34CD953DA37B2FF9A310F16412ACC895B185C7704A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: F\oR$k $z:w$z:w
          • API String ID: 0-574126991
          • Opcode ID: 57f924646bd75ee5b98a0cf874e52c01a2875ae083719833d6eb3975a3a25ad1
          • Instruction ID: 91c22c12edd8316e8312fa84cde445edd24be5b4534073a9a62160b83f6e4714
          • Opcode Fuzzy Hash: 57f924646bd75ee5b98a0cf874e52c01a2875ae083719833d6eb3975a3a25ad1
          • Instruction Fuzzy Hash: D5B11471A44388DFDF389F24CD997EA37B2FF95300F56812ADC899B245C7704A858B02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: 6f0a87800e846bc3fc3802f8cd7dbf17f3635eb59d6f4311d68a639256e0de79
          • Instruction ID: 1196ab8f013207919e75abfbb1e62255e204557b8954599c285d49bb7297138a
          • Opcode Fuzzy Hash: 6f0a87800e846bc3fc3802f8cd7dbf17f3635eb59d6f4311d68a639256e0de79
          • Instruction Fuzzy Hash: C6E15A71A84349DFDB389E298CD47DA37A2FF95350F95012EDC9D87284D3B48A85CB06
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: 103f40f8173aa1181bf0e03b3e7693fc131cb99f65a4630405c59d79c9cb898a
          • Instruction ID: 660a4d81ec2fb9f19fd49b6d489f5bc158c7e1face66886e39a449457efd27bb
          • Opcode Fuzzy Hash: 103f40f8173aa1181bf0e03b3e7693fc131cb99f65a4630405c59d79c9cb898a
          • Instruction Fuzzy Hash: D1E16A75A84349DFDB389E398CD47DA37A2BF95350F96411EDC8D9B284C3B48A85CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: d6703637e8d8780487b1cf249098e03ab56bd60b8cfabde198f29b1272a8e5ce
          • Instruction ID: 2cb677548e52acf5b59672b0ec45eb8c26e46efa1876891bbce691f726f03e61
          • Opcode Fuzzy Hash: d6703637e8d8780487b1cf249098e03ab56bd60b8cfabde198f29b1272a8e5ce
          • Instruction Fuzzy Hash: 87D14A71A84389DFDB349E398CD47DA7BA2BF86310F95411EDC9D8B285D3B48685CB01
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: 5079486c295fc85e860bd3c41ec0516fccd62c2a21a4d7d4345e8742bedbe7b5
          • Instruction ID: e7ce8b4d13e7323896f1a3be77175d9bee9be6be643024f4a9638f7877652471
          • Opcode Fuzzy Hash: 5079486c295fc85e860bd3c41ec0516fccd62c2a21a4d7d4345e8742bedbe7b5
          • Instruction Fuzzy Hash: 20C13671A84349DFDB349E398CD87DA7BA2BF89340F95411EDC9D87284D3B48685CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: 0a56d2dac25c02dbe764492b23e99f8e8cf2088b311ae77d059474ab554430dd
          • Instruction ID: a947b44bdc4b38735f9c562cbc08e0c47056afec30d8a31e09702ad66e189f6d
          • Opcode Fuzzy Hash: 0a56d2dac25c02dbe764492b23e99f8e8cf2088b311ae77d059474ab554430dd
          • Instruction Fuzzy Hash: E8C15B76A84389EBDB399E3889D83DA3BB1FF85310F99011EDC5D9B191D3B88585CB01
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID: %q[K$T5o$]2V$
          • API String ID: 560597551-4193607111
          • Opcode ID: 420ae2f1e3cf5c59225c89a7c16299968c4666fac8398431d4057e51f250a6ef
          • Instruction ID: 91b6ed45553179a49ec49337e3c5c36bef33764c8f2f852979faf77357906590
          • Opcode Fuzzy Hash: 420ae2f1e3cf5c59225c89a7c16299968c4666fac8398431d4057e51f250a6ef
          • Instruction Fuzzy Hash: E9D179726883859FDB269F358CD83DA7BF2BF8A350F6A015ACC859B181D3B44945CB12
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: a89a70f47d88c36fb4e9ff90497209875d89db65c04caee8a1a9037c6768c326
          • Instruction ID: f5df09edac8e5fd749f73a31822b3b1842cda306ab8c4f95c7af8a309de4d682
          • Opcode Fuzzy Hash: a89a70f47d88c36fb4e9ff90497209875d89db65c04caee8a1a9037c6768c326
          • Instruction Fuzzy Hash: 94C14771A84389DFDB349E398CD87DA37A2BF85340F95411EDC9E8B285D3B48685CB12
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: c1e84f3dc8fb130527360b49933ee3b11ae17e550108010be1d3d0305cfa0ca3
          • Instruction ID: 2ff4f24f59870f9e3e861eb1caf8588a0fbdf44fa5b385c6e404b8ec4a4c10b8
          • Opcode Fuzzy Hash: c1e84f3dc8fb130527360b49933ee3b11ae17e550108010be1d3d0305cfa0ca3
          • Instruction Fuzzy Hash: 24C13B71A84389DFDB349E3988E53DA3BB2BF85310F95411ECC9D87195D3B48685CB12
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: 37bd2e4904ddcc8b34038c1dbb996c6fb54a53c650601843d6bd251a5de1c9d5
          • Instruction ID: 1915089543d2f09c1c2401eac91f54871b2ee27b912eddcd961c3b650335003f
          • Opcode Fuzzy Hash: 37bd2e4904ddcc8b34038c1dbb996c6fb54a53c650601843d6bd251a5de1c9d5
          • Instruction Fuzzy Hash: 22C16B71A84389DFDB349E798DD43DA7BA2BF86300F95401ECC9E8B195D3B48685CB12
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: f159d745e2864c71890319122cbcb51745174c67677b35132fd159cd824c6f03
          • Instruction ID: d1b94ab20aed24590612d0ecaeb57f39d52f4c6514a4671f97ae840457c72b3d
          • Opcode Fuzzy Hash: f159d745e2864c71890319122cbcb51745174c67677b35132fd159cd824c6f03
          • Instruction Fuzzy Hash: 74C12775684349DFDF349E298DE47DA37A2AF89340F95401EDC8ED7284D3748685CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: k $z:w$z:w
          • API String ID: 0-4106860417
          • Opcode ID: 6b7fdf64c16b58704fb0bf6f60814fc8ba9db136a09c882767bbbecf744c4e9a
          • Instruction ID: a6fa8122580259082c43bdad73cb2ce92fdfdc5b309db3b58ce1046090efd644
          • Opcode Fuzzy Hash: 6b7fdf64c16b58704fb0bf6f60814fc8ba9db136a09c882767bbbecf744c4e9a
          • Instruction Fuzzy Hash: C1C13671A48789DFDB399F34CD993EA37A2FF89300F56412ADC995B281C7704A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • NtWriteVirtualMemory.NTDLL(?,773A7AE0,?,00000000,?,?,?,0000001F,6DBEA05A,?,-000000018CA24DAA,0FB1135D), ref: 021086C4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: MemoryVirtualWrite
          • String ID: k $z:w$z:w
          • API String ID: 3527976591-4106860417
          • Opcode ID: b1fcf9209d4ece79e05fc5ffda6a84943350a719d3647438e3e77c910a49d969
          • Instruction ID: 4bd12dc443d4307ef215007d2ff9a15bd3d84a9455a0e010a719925de0d62d45
          • Opcode Fuzzy Hash: b1fcf9209d4ece79e05fc5ffda6a84943350a719d3647438e3e77c910a49d969
          • Instruction Fuzzy Hash: 86B147B2A887859FDB359F34CCD53D93BB2FF96300F5A416AD8994B192C7B04585CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: k $z:w$z:w
          • API String ID: 0-4106860417
          • Opcode ID: aaab0e68a7f16e1ff7f2704bec3c1abd1d2ff0886381e8e578e1c2b0703d39d3
          • Instruction ID: 5a534d09f3412269aaed8f7d0746a891c54a65b59970a316d2134077df0c9324
          • Opcode Fuzzy Hash: aaab0e68a7f16e1ff7f2704bec3c1abd1d2ff0886381e8e578e1c2b0703d39d3
          • Instruction Fuzzy Hash: 93C114B1A483859FDB399F34CC957DA3BB2FF99300F5A412ADC895B281D7704A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n$Vpul
          • API String ID: 0-3606006924
          • Opcode ID: 5cc6f7e6a0e41cbe9561f811a0a61abf4892028001c6cf0defca6f1d71b650f6
          • Instruction ID: 2d7272a7b03fe14b9194d4bacd05572afe27bccf95f0d24eba6ba0c45a489033
          • Opcode Fuzzy Hash: 5cc6f7e6a0e41cbe9561f811a0a61abf4892028001c6cf0defca6f1d71b650f6
          • Instruction Fuzzy Hash: 02A12571A84349DBDB389E3989E93EA37A2BF89350F95001ECC9D97180D3B48685CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: k $z:w$z:w
          • API String ID: 0-4106860417
          • Opcode ID: ca11208d2ccaaf29c9a47912744e9f942005b267548dab5bb22c4efa84a9012e
          • Instruction ID: 1ac21dbe60ad62163087e3d38d20d9992e99bc1a3e762658cdab56d8a89a40ff
          • Opcode Fuzzy Hash: ca11208d2ccaaf29c9a47912744e9f942005b267548dab5bb22c4efa84a9012e
          • Instruction Fuzzy Hash: 75A125B1644389DFEB39DF24CD957DA37B2FF95300F5A812ADC994B241C77086858B42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: k $z:w$z:w
          • API String ID: 0-4106860417
          • Opcode ID: 096a7252557945d90698f2fb02d6fe1bc573ab9104aea9a60e632f51862b09f9
          • Instruction ID: dc709190eb93d4f606e175231fe91e195724596fcd81e7ce2c65c3cbc6e95e59
          • Opcode Fuzzy Hash: 096a7252557945d90698f2fb02d6fe1bc573ab9104aea9a60e632f51862b09f9
          • Instruction Fuzzy Hash: 75B11571644348DFDF398E38CD957EA37B2FF99300F56812ADC899B255D7704A858B02
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • NtWriteVirtualMemory.NTDLL(?,773A7AE0,?,00000000,?,?,?,0000001F,6DBEA05A,?,-000000018CA24DAA,0FB1135D), ref: 021086C4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: MemoryVirtualWrite
          • String ID: k $z:w$z:w
          • API String ID: 3527976591-4106860417
          • Opcode ID: 8f5c3cdf60ad0f6a1ec67d4ac9d8847a3c3a7cae5ad07dd5a51befd7d0e5a932
          • Instruction ID: a1d2bea30d91272bd375b0a6d59c4342b3f38e550c7210feb1dff64574ed4dd7
          • Opcode Fuzzy Hash: 8f5c3cdf60ad0f6a1ec67d4ac9d8847a3c3a7cae5ad07dd5a51befd7d0e5a932
          • Instruction Fuzzy Hash: 19A102B2A48388DFEB359F34CC857DA3BB2FF96300F5A4129D9998B251D7704685CB02
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID: T5o$]2V$
          • API String ID: 560597551-2236104366
          • Opcode ID: 3a96d0ab610e7be249b6ddb380f54375b2552cb3de7d3a0389cc214a778b4d8c
          • Instruction ID: ced5c99db81cde998e5e05ce4134d4bdcde1dcd0fb5a56512bbbfe7d88fc225c
          • Opcode Fuzzy Hash: 3a96d0ab610e7be249b6ddb380f54375b2552cb3de7d3a0389cc214a778b4d8c
          • Instruction Fuzzy Hash: EED18672A843859FD7269F79CCC83CA7BA2FF8A310F6A421ECC955B195D3B44945CB02
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • NtWriteVirtualMemory.NTDLL(?,773A7AE0,?,00000000,?,?,?,0000001F,6DBEA05A,?,-000000018CA24DAA,0FB1135D), ref: 021086C4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: MemoryVirtualWrite
          • String ID: k $z:w
          • API String ID: 3527976591-3769489843
          • Opcode ID: 92f85ee1952722fd87407db17774ff5357a6fe2f8334f9cd3e80ab0f298f2dbc
          • Instruction ID: ddd7b1db0e831681c7cc0e7d91ce829667a57dee66854de10161d3f7e04da388
          • Opcode Fuzzy Hash: 92f85ee1952722fd87407db17774ff5357a6fe2f8334f9cd3e80ab0f298f2dbc
          • Instruction Fuzzy Hash: A5B137B29886849FE72A9F38CC883D53BA1FF95700F5F016AD8950B1D6C7B05095CF4A
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K$(n
          • API String ID: 0-1733685635
          • Opcode ID: b6c2f4429e9241c91b51d119f6873c33261cf7b234902f479ac7e5b0f368a765
          • Instruction ID: 3cbe1f1bad751e9b77061c137c082017f5024e0ca610be80bc1b92f92b49c091
          • Opcode Fuzzy Hash: b6c2f4429e9241c91b51d119f6873c33261cf7b234902f479ac7e5b0f368a765
          • Instruction Fuzzy Hash: 55714675A84345EBDB385E39C8D93EA3BA2FF89300F96011ECD9D87585D3B58685CB02
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • NtWriteVirtualMemory.NTDLL(?,773A7AE0,?,00000000,?,?,?,0000001F,6DBEA05A,?,-000000018CA24DAA,0FB1135D), ref: 021086C4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: MemoryVirtualWrite
          • String ID: k $z:w
          • API String ID: 3527976591-3769489843
          • Opcode ID: 308dac74a0b8312fd1cb13e22702af8eb1b039fe1dfb5adba2a7681c7152d107
          • Instruction ID: 01fcb13b77d43b6509fa253f519fdb4ee80170c80a005d7ab5bbf1f76c308cef
          • Opcode Fuzzy Hash: 308dac74a0b8312fd1cb13e22702af8eb1b039fe1dfb5adba2a7681c7152d107
          • Instruction Fuzzy Hash: 977132B2A48388DFDB368F74CD993D93BA2FF96300F5B416AD8950B192C7704595CB42
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • NtWriteVirtualMemory.NTDLL(?,773A7AE0,?,00000000,?,?,?,0000001F,6DBEA05A,?,-000000018CA24DAA,0FB1135D), ref: 021086C4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: MemoryVirtualWrite
          • String ID: k $z:w
          • API String ID: 3527976591-3769489843
          • Opcode ID: 26e5bb7459de0b5fb9053a961631cce24146106f0ed646a521fe31b0050f4dee
          • Instruction ID: 1ebaef1a4e833303957a496cce0e24c6692578bba97310cfa553cd1ba7703183
          • Opcode Fuzzy Hash: 26e5bb7459de0b5fb9053a961631cce24146106f0ed646a521fe31b0050f4dee
          • Instruction Fuzzy Hash: A66101B2A48348DFEB399F24CD957DA3BB2FF96300F564129DC994B192D3704A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: 8:{g
          • API String ID: 0-574241746
          • Opcode ID: 4de92d6895a27ddad203c7bec833343f05a387b9de81b9ee225f8bbf0c7f0c1d
          • Instruction ID: 808efa81838fb10147939b55549ed605654147f685151b1f5e41ae8cbda0bdb9
          • Opcode Fuzzy Hash: 4de92d6895a27ddad203c7bec833343f05a387b9de81b9ee225f8bbf0c7f0c1d
          • Instruction Fuzzy Hash: F3429B316483858FDB34DF38C8D97DA7BE2AF16320F89856ACC9A8B1D5D7718542CB12
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: #100
          • String ID: VB5!6&*
          • API String ID: 1341478452-3593831657
          • Opcode ID: fe6bcdf7a211bb4a5310fc5c7b6a4452d9107ba669a2206b2c9f4d061e84caa3
          • Instruction ID: f6c4100e24907f38f7db4d69059254fbc8352fd23a989a64d3ed8fe52a3f8660
          • Opcode Fuzzy Hash: fe6bcdf7a211bb4a5310fc5c7b6a4452d9107ba669a2206b2c9f4d061e84caa3
          • Instruction Fuzzy Hash: DF029D3244E3D18FC7139B749EA21927FB0AE1331472E05DBC4C19F1B3D2296A2AD766
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: <
          • API String ID: 0-930352506
          • Opcode ID: eb3a45cef3acfcc0a01705f7d03313a75c627c9dd4b8a5ea6b30390d32a309bb
          • Instruction ID: f85244ecb52ba8352d4f94067d15ea615efa41afc9e15b466236ce22f4c52845
          • Opcode Fuzzy Hash: eb3a45cef3acfcc0a01705f7d03313a75c627c9dd4b8a5ea6b30390d32a309bb
          • Instruction Fuzzy Hash: E1E17AB2A887859FD7386E38D8C5AEA3BB1FFC4704F99021AD86947194D7B04A84CF45
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K
          • API String ID: 0-1541054192
          • Opcode ID: 33d69fb57be9cd23d80b4fe6851631f09c271d356bcb10a593be245b92391a4c
          • Instruction ID: ec138b436438515534a555de480c3fd378f5360118e87c14fff2af3f3fa86559
          • Opcode Fuzzy Hash: 33d69fb57be9cd23d80b4fe6851631f09c271d356bcb10a593be245b92391a4c
          • Instruction Fuzzy Hash: 94614572A84745ABE734AE38C8D93DA77E1FF89700F8A011EDD9D87181D7B84589CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K
          • API String ID: 0-1541054192
          • Opcode ID: 1b461242edd33ac5d041a9954a14ae4e110aac1d4663e2243df10213332dadd2
          • Instruction ID: 140655a8e2caf90a6a91d99196f1191e0cdf64d4ed2261e268b67680319a07aa
          • Opcode Fuzzy Hash: 1b461242edd33ac5d041a9954a14ae4e110aac1d4663e2243df10213332dadd2
          • Instruction Fuzzy Hash: AE714A76A88385AFDB359E3989D83DE7BB2FF49300F99001ADD9987181D3B44685CB12
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K
          • API String ID: 0-1541054192
          • Opcode ID: ee9f66f9aecead423f3a817a9c5cf6ee5867a8d36fe77932a84d2c75a9cbf0ab
          • Instruction ID: caf715145ce9a017fcfc8dff17677c86b12585343261505363a777fdffd7edc8
          • Opcode Fuzzy Hash: ee9f66f9aecead423f3a817a9c5cf6ee5867a8d36fe77932a84d2c75a9cbf0ab
          • Instruction Fuzzy Hash: 4E516672A84345EFEB359E78C8D47DA77A2FF49300F95011ADC9E87281D3B44685CB02
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID: %q[K
          • API String ID: 560597551-1541054192
          • Opcode ID: bd6dade4467bb327761c5aa89cbf1d5c61be58d0487b765503e5764bb211e7c2
          • Instruction ID: 1973f52e48a78e48df34deb4276ac3f571da232c18d5d09847cb0d93b0cde537
          • Opcode Fuzzy Hash: bd6dade4467bb327761c5aa89cbf1d5c61be58d0487b765503e5764bb211e7c2
          • Instruction Fuzzy Hash: 4B513576A883449AE7249E388CDD7DA7BE2FF48300FD9411EDD9A871D9D3B04589CA02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K
          • API String ID: 0-1541054192
          • Opcode ID: 6a11c1f458adbb0b9c1717e3eaf0a6c6dd6565f4d245eec8319a66d406631016
          • Instruction ID: 115aeabde230371dc79399515b9c6ba15a55580e3404c928ebda525c47e41497
          • Opcode Fuzzy Hash: 6a11c1f458adbb0b9c1717e3eaf0a6c6dd6565f4d245eec8319a66d406631016
          • Instruction Fuzzy Hash: 6B412572A84345ABEB34AE3989D93DA76E6FF48300FC6011EDD5D87185D3B44689CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: %q[K
          • API String ID: 0-1541054192
          • Opcode ID: 7f6f05ab166c34ac89899c49fbb581c3797dbe4be1d550824a58cbe14a37422f
          • Instruction ID: c436c43e8bd56f832f74b697a0a6e13a1508c2603e7053eaed815014f7755e28
          • Opcode Fuzzy Hash: 7f6f05ab166c34ac89899c49fbb581c3797dbe4be1d550824a58cbe14a37422f
          • Instruction Fuzzy Hash: DB413672A843449BEB349E3888D97DA77E2FF48300FC6411EDD9A87589D3B44689CB12
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • NtProtectVirtualMemory.NTDLL(46341624,?,?,?,?,0210F0F2,-CEC2260B,?,?), ref: 021102CE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID: /uz
          • API String ID: 2706961497-3618625899
          • Opcode ID: 1ba9d705612e61028bb38e8fcd9809353954660442f0af943e153af8c3246c70
          • Instruction ID: 7d952a5bb9129d79b6cc7f0e656a2bca66d04de7e2252e6477cf1a1072853d78
          • Opcode Fuzzy Hash: 1ba9d705612e61028bb38e8fcd9809353954660442f0af943e153af8c3246c70
          • Instruction Fuzzy Hash: CD11AFB1A552498FEB78CE28CC94BEE77A29FD9300F55812DE84A8B344C7319945CB16
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 2cd025b00d549f99be50d652a87fb85525b2ab71ae20f7705b73028f84d98e26
          • Instruction ID: 42c4c4d2cea18d8f5b4fcfceb435f9cd2cb7155eb19f564007729f0950f6addb
          • Opcode Fuzzy Hash: 2cd025b00d549f99be50d652a87fb85525b2ab71ae20f7705b73028f84d98e26
          • Instruction Fuzzy Hash: D5617A71588349CFCF385E6889D47EA36A2EF29254F92002BDC1F9B284C7F14F41CA52
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b4923c0193cc7e284aab4d27ab90b3f6718424329159357b310ed19d7b789efc
          • Instruction ID: 03a0d20cf787ec040bb5e3ceba4363644f7ae141f447169e60820289b13b2b47
          • Opcode Fuzzy Hash: b4923c0193cc7e284aab4d27ab90b3f6718424329159357b310ed19d7b789efc
          • Instruction Fuzzy Hash: D4724AF3EC4A81AAB329AE39D8C93657BE4FECC70178E234AD2A5160D1D7E04594CF45
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: eac5239a5c4dcd1f4a6ae9dd4767dfdf7500e1ea25f986749f656c103533088f
          • Instruction ID: a2bcf402cdb06e78a13c19e3452831e9d12ce6492849db7f0383286f23b8718d
          • Opcode Fuzzy Hash: eac5239a5c4dcd1f4a6ae9dd4767dfdf7500e1ea25f986749f656c103533088f
          • Instruction Fuzzy Hash: 9A8157B568438ADFCF309E788CD4BEA3766AF59350F91412ADC5DCB284D7B08A41CB42
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • NtSetInformationThread.NTDLL ref: 02111136
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: InformationThread
          • String ID:
          • API String ID: 4046476035-0
          • Opcode ID: a8d90e394692c56b3b011436fb98c7e5f62cec114b0282265bc1ace99a5f73a2
          • Instruction ID: 4bd46616a42dbf64c66e0cba4fe732abbdae71c6b51532cd6d0b8b962d222875
          • Opcode Fuzzy Hash: a8d90e394692c56b3b011436fb98c7e5f62cec114b0282265bc1ace99a5f73a2
          • Instruction Fuzzy Hash: 7F913731984749CFDB78CE3489A43DA77A2AF49350F56812BCC6D9B254D3318A85CB42
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: InitializeThunk
          • String ID:
          • API String ID: 2994545307-0
          • Opcode ID: f324aa93c6a3875472d912dac325d630ca58cd2d1cc045f8e02e9fcd00aa72af
          • Instruction ID: df0aae539fc2874cc9740dcf17b05ad5c9250e1f68d50b2f18d04b7fa4bbbaf9
          • Opcode Fuzzy Hash: f324aa93c6a3875472d912dac325d630ca58cd2d1cc045f8e02e9fcd00aa72af
          • Instruction Fuzzy Hash: B31194F3FC0F8165B219AA79D8C91046BE8FDD4B0338E222B9361160D1D3D055969FCD
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d96cdbfef67da2659e31049381a72a882254b4644ae223a6e31cef796ff53a19
          • Instruction ID: 200e802e021191dcbd62885f44368a90d6d9fd28cc025bd863bc259be12de307
          • Opcode Fuzzy Hash: d96cdbfef67da2659e31049381a72a882254b4644ae223a6e31cef796ff53a19
          • Instruction Fuzzy Hash: C0F169B2A807899FEB38AE35C9D53EA3BA6FF95350F49021ADE95570D1D3B04980CF41
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5a19df0dfaf88a27582e4167c4b8f27640fc30d8528dd1441de303a37c332d88
          • Instruction ID: 2aa216b59b672d09aee171ba052361bb83b0908f00dfe4c27a3132db0b97daf1
          • Opcode Fuzzy Hash: 5a19df0dfaf88a27582e4167c4b8f27640fc30d8528dd1441de303a37c332d88
          • Instruction Fuzzy Hash: D0E168B3AC0745ABE328AE3989C93E57FA5FFC9710B5E120ADA95170D1D3E05984CF42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6ef9f2236321aeefaf069fab55b0285b086b242ce473806d6e8a4420f76bb7ec
          • Instruction ID: b1cf8d7a27483fc42f60831569669dccf3550a60a1bd217c06d2278cbbdaedd3
          • Opcode Fuzzy Hash: 6ef9f2236321aeefaf069fab55b0285b086b242ce473806d6e8a4420f76bb7ec
          • Instruction Fuzzy Hash: B7E168B3AC4B81ABE328AE3988C93957FE5FFD9710B5E120AD6A5170D1D3E44884CF41
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8b7f4d10012db6d4458e1cb2075fc99076d43121626e3a8d7bca0f9fef537f44
          • Instruction ID: 5c19d5d1a602ad93ca7a21b7a8f32a7a3b27be697c4982fbc29045fc9812d89f
          • Opcode Fuzzy Hash: 8b7f4d10012db6d4458e1cb2075fc99076d43121626e3a8d7bca0f9fef537f44
          • Instruction Fuzzy Hash: C5E158B3AC4745ABE738AE3989C53E53BA6FFD9350B4E021ADB95170D1D3A48980CF41
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f780cb89556195b349f83e17a98cb02d67540e9e4af7ce27d0f6eff18032d0eb
          • Instruction ID: 62f9d0d7a797486c6bf86c3a67ae6ee2ade834b2403ca0e339224d59048f99af
          • Opcode Fuzzy Hash: f780cb89556195b349f83e17a98cb02d67540e9e4af7ce27d0f6eff18032d0eb
          • Instruction Fuzzy Hash: 25D167B3AC0B45ABE734AE3989C53D57BA5FFC9750B5E120ADA95170D1D3E04980CF42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2407888e8cb54403a63aa142dfdbc0a0fc751a552dadbac2de3f416d9e2220af
          • Instruction ID: 5eb6fe484616df34e746cc5b05e87327ba3fdb918db34f94d93651c393fa8dc2
          • Opcode Fuzzy Hash: 2407888e8cb54403a63aa142dfdbc0a0fc751a552dadbac2de3f416d9e2220af
          • Instruction Fuzzy Hash: E0D178B3AC0745AFE738AE3589C53E53BA6FFD9350B4E021ADA96170D0D3A04984CF42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e7bb5af26ec121c6dd15a02c13d3f887e17dc080662e2bbdfd352aa729efd9fb
          • Instruction ID: 698e103b18b6c73058f639f7d770c2e2b7651edbfd1b3006102f52f8f9ce7332
          • Opcode Fuzzy Hash: e7bb5af26ec121c6dd15a02c13d3f887e17dc080662e2bbdfd352aa729efd9fb
          • Instruction Fuzzy Hash: 2CC178B3AC0745ABE338AE3989C53E53BA5FFD9750B5E120ADA95170D0D3E04984CF82
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 34b4c238a3acc4e7db850793a230b93e022044edfaa45d4729945ab999c58a7e
          • Instruction ID: 85c427847ca1b745eba9bd91a43706cdae216ea991cf874f30cc832e7059213d
          • Opcode Fuzzy Hash: 34b4c238a3acc4e7db850793a230b93e022044edfaa45d4729945ab999c58a7e
          • Instruction Fuzzy Hash: D7C159B3AC47459FE738AE3589C53E93BA6FF99350B5E020ADA95170D1D3E44980CF42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: eadbba9ba54f98bf849e1ca04421b41641fda84ba33510925028a70ea25877fb
          • Instruction ID: 07dae332399e5e3c26c813c022bbfc33abc30554b8183c3958c966c9727a649b
          • Opcode Fuzzy Hash: eadbba9ba54f98bf849e1ca04421b41641fda84ba33510925028a70ea25877fb
          • Instruction Fuzzy Hash: 9CC148B3AC0745AFE734AE3589C53E93BA6FF99350B5E021ADA95170D1D3E44980CF42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3ba10cbad276b70b6822a464a54ce7b5fcb668f1332c5435e918682c60f779ae
          • Instruction ID: 617d88752992d79e682e64713fc0ea7e1f6c547c12f23f703ff2ab6954eba378
          • Opcode Fuzzy Hash: 3ba10cbad276b70b6822a464a54ce7b5fcb668f1332c5435e918682c60f779ae
          • Instruction Fuzzy Hash: 32B147B3AC0B85AAA338AE3A89C96957BE5FFC871079E120AD795170D1D3E48494CF41
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9d027736f7a654d77c84cffacf52431873682e86d77da4ac133dd29e50e44aef
          • Instruction ID: e48c7efa9fb3356bb6d0c9f143f30c4f8662d4b329d1fa360a8585bbf388c81f
          • Opcode Fuzzy Hash: 9d027736f7a654d77c84cffacf52431873682e86d77da4ac133dd29e50e44aef
          • Instruction Fuzzy Hash: 6DA146B3EC0B85ABA338AE3A89C92957BA5FFD871075E120AD7A5170D1D3E48494CF41
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004219E1
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004219FA
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000138), ref: 00421A24
          • #561.MSVBVM60(?), ref: 00421A47
          • __vbaFreeObj.MSVBVM60 ref: 00421A5E
          • __vbaFreeVar.MSVBVM60 ref: 00421A6A
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421ABA
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421AD3
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,00000178), ref: 00421AFA
          • #595.MSVBVM60(00000003,00000000,?,?,?), ref: 00421B33
          • __vbaFreeObj.MSVBVM60 ref: 00421B3C
          • __vbaFreeVarList.MSVBVM60(00000004,00000009,?,?,?), ref: 00421B60
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421B7C
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421B95
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403EE8,000001A8), ref: 00421BB8
          • __vbaFreeObj.MSVBVM60 ref: 00421BC1
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421BDA
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421BF3
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000070), ref: 00421C17
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421C30
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421C49
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E70,00000150), ref: 00421C73
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421C8C
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421CA5
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E70,00000108), ref: 00421CCC
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814,00000700), ref: 00421D1F
          • __vbaFreeStr.MSVBVM60 ref: 00421D28
          • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 00421D3C
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421D58
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421D71
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E40,00000108), ref: 00421D9B
          • __vbaFreeObj.MSVBVM60 ref: 00421DC5
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421DDE
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421DF7
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,00000178), ref: 00421E1E
          • __vbaLateIdCallLd.MSVBVM60(00000003,?,00000000,00000000), ref: 00421E33
          • __vbaStrVarMove.MSVBVM60(00000003), ref: 00421E43
          • __vbaStrMove.MSVBVM60 ref: 00421E54
          • __vbaFreeStr.MSVBVM60 ref: 00421E8D
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00421E9D
          • __vbaFreeVar.MSVBVM60 ref: 00421EAC
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421EC5
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421EDE
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E40,000001C8), ref: 00421F05
          • __vbaStrCopy.MSVBVM60 ref: 00421F3B
          • __vbaStrMove.MSVBVM60 ref: 00421F4E
          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00421F79
          • __vbaFreeObj.MSVBVM60 ref: 00421F85
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421F9E
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421FB7
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F3C,00000048), ref: 00421FDE
          • __vbaStrCopy.MSVBVM60 ref: 00422018
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814,00000704), ref: 0042205E
          • __vbaFreeStrList.MSVBVM60(00000002,?,00000000), ref: 0042206A
          • __vbaFreeObj.MSVBVM60 ref: 00422076
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814,00000708), ref: 004220A5
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004220BA
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004220D3
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000048), ref: 004220F4
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422109
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422122
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000140), ref: 0042214C
          • __vbaFreeStr.MSVBVM60 ref: 00422187
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00422197
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814,0000070C), ref: 004221CF
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004221E4
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004221FD
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000088), ref: 00422227
          • __vbaStrCopy.MSVBVM60 ref: 00422231
          • __vbaFreeStr.MSVBVM60 ref: 00422253
          • __vbaFreeObj.MSVBVM60 ref: 0042225C
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422275
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042228E
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F3C,00000070), ref: 004222B2
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004222C7
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004222E0
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E70,00000108), ref: 00422307
          • __vbaStrCopy.MSVBVM60 ref: 00422311
          • __vbaFreeStrList.MSVBVM60(00000002,?,00000000), ref: 00422360
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00422370
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004223C1
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004223DA
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000138), ref: 00422404
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814,00000710), ref: 00422461
          • __vbaFreeObj.MSVBVM60 ref: 00422466
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814,00000714), ref: 004224BB
          • __vbaStrCopy.MSVBVM60 ref: 004224C5
          • __vbaFreeStr.MSVBVM60 ref: 00422511
          • __vbaVarForInit.MSVBVM60(?,?,?,?,?,?), ref: 00422577
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422598
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004225B1
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,000000F8), ref: 004225D8
          • __vbaLateIdCallLd.MSVBVM60(00000003,?,00000000,00000000), ref: 004225E9
          • __vbaStrCopy.MSVBVM60 ref: 004225FA
          • __vbaI4Var.MSVBVM60(00000003,?,00000000), ref: 00422628
          • __vbaFreeStr.MSVBVM60 ref: 00422645
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00422655
          • __vbaFreeVar.MSVBVM60 ref: 00422664
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814,00000718), ref: 00422683
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004226A1
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004226BA
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000060), ref: 004226DE
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004226F3
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042270C
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000160), ref: 00422733
          • __vbaLateIdCallLd.MSVBVM60(00000003,?,00000000,00000000), ref: 00422744
          • __vbaI4Var.MSVBVM60(00000003,33500000), ref: 0042277B
          • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 004227AC
          • __vbaFreeVar.MSVBVM60 ref: 004227BB
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004227D4
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004227ED
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,00000048), ref: 0042280E
          • __vbaFreeStr.MSVBVM60 ref: 00422840
          • __vbaFreeObj.MSVBVM60 ref: 00422849
          • __vbaVarForNext.MSVBVM60(?,?,?), ref: 00422861
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,00403814), ref: 00422891
          • __vbaSetSystemError.MSVBVM60 ref: 0042289E
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004228B7
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004228D0
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000188), ref: 004228FA
          • __vbaFreeObj.MSVBVM60 ref: 00422917
          • __vbaNew2.MSVBVM60(00403EA0,00425B90), ref: 00422935
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,0000001C), ref: 0042295A
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040410C,00000064), ref: 0042297F
          • __vbaFreeObj.MSVBVM60 ref: 00422984
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 0042299D
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004229B6
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403EE8,00000180), ref: 004229E0
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004229F5
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422A0E
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E70,00000060), ref: 00422A32
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422A47
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422A60
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403EE8,00000168), ref: 00422A8A
          • __vbaLateIdCallLd.MSVBVM60(00000003,?,00000000,00000000), ref: 00422A9E
          • __vbaI4Var.MSVBVM60(00000003,0057934C), ref: 00422AB3
          • __vbaSetSystemError.MSVBVM60(001C01CD,006AB41C,00621C3E,00159F56,0044A76F,0013F3EE,?,0069125E,000B0E66,00000000), ref: 00422AF6
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422B0F
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422B2B
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E40,00000058), ref: 00422B4F
          • __vbaFreeObjList.MSVBVM60(00000005,?,?,?,?,?), ref: 00422B85
          • __vbaFreeVar.MSVBVM60 ref: 00422B94
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422BB6
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422BCF
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000118), ref: 00422BF9
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422C0E
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422C27
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403EE8,00000180), ref: 00422C51
          • __vbaFpI4.MSVBVM60 ref: 00422C5B
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,004037E4,000002C8), ref: 00422CAD
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00422CB9
          • __vbaSetSystemError.MSVBVM60 ref: 00422CCD
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,004037E4,00000084), ref: 00422D1A
          • __vbaStrToAnsi.MSVBVM60(?,Timothee), ref: 00422D2B
          • __vbaStrToAnsi.MSVBVM60(00000000,Ackees,00000000), ref: 00422D37
          • __vbaSetSystemError.MSVBVM60(00000000), ref: 00422D45
          • __vbaFreeStrList.MSVBVM60(00000002,00000000,?), ref: 00422D6B
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422D90
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422DA9
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,000000F8), ref: 00422DD0
          • __vbaLateIdCallLd.MSVBVM60(00000003,?,00000000,00000000), ref: 00422DE1
          • __vbaFpI4.MSVBVM60 ref: 00422DF2
          • __vbaI4Var.MSVBVM60(00000003,4AEDEF88,00000000), ref: 00422E05
          • __vbaHresultCheckObj.MSVBVM60(00000000,004011B0,004037E4,000002C8), ref: 00422E49
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00422E55
          • __vbaFreeVar.MSVBVM60 ref: 00422E64
          • __vbaFreeVarList.MSVBVM60(00000002,?,?,00422EFA), ref: 00422EE7
          • __vbaFreeVar.MSVBVM60 ref: 00422EF3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckHresult$Free$New2$List$Copy$CallLate$ErrorSystem$Move$Ansi$#561#595InitNext
          • String ID: Ackees$Amphidiarthrosis$BRUDELYS$EXTENSORYMOVERESPIRALNOBI$NEGOTIANTS$Nringsvirksomhed$Nutriture4$R7K$RIFFELGANG$Skatteer1$Timothee$VP$Wineglassful$macaranga$mosquital
          • API String ID: 2303545845-1592060415
          • Opcode ID: 06206079cf428afd6eb0d8b1ea397ff26ef161a4c4ce2bca31a680e67e7170e2
          • Instruction ID: 27879ab2088f3aca2b7cd1a025eb754b6da19bac29a35e7e0de8b11a1f475ed6
          • Opcode Fuzzy Hash: 06206079cf428afd6eb0d8b1ea397ff26ef161a4c4ce2bca31a680e67e7170e2
          • Instruction Fuzzy Hash: 51D28F70A00218AFDB20DF64CD88FEAB7B8FB58701F508569F549E71A0DB745A85CF68
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$#705CopyMove
          • String ID:
          • API String ID: 4024075114-0
          • Opcode ID: 12e1ddc4d7f56f3374140685529ff06c8830ee54dd8df04a7e537cc0627329ba
          • Instruction ID: efe62c541f236023aacdd268b4ee6a70e2b88cda778bd68d8105b00b868c9c60
          • Opcode Fuzzy Hash: 12e1ddc4d7f56f3374140685529ff06c8830ee54dd8df04a7e537cc0627329ba
          • Instruction Fuzzy Hash: 4D11E9B1D01229EBCB00DF95DA45ADEBFB8FF08705F10815AE505B7260D7781A45CF94
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 58%
          			E00423DD0(intOrPtr* _a4) {
          				intOrPtr _v8;
          				intOrPtr _v12;
          				intOrPtr _v16;
          				intOrPtr _v24;
          				intOrPtr* _t11;
          				intOrPtr* _t13;
          				void* _t16;
          				void* _t21;
          				void* _t23;
          				intOrPtr _t25;
          
          				 *[fs:0x0] = _t25;
          				_v16 = _t25 - 8;
          				_v12 = 0x401298;
          				_v8 = 0;
          				_t11 = _a4;
          				 *((intOrPtr*)( *_t11 + 4))(_t11, _t21, _t23, _t16,  *[fs:0x0], 0x401316);
          				__imp__#690(L"Underfeature2", L"boardwalks", L"trophoplasmatic", L"nonvital"); // executed
          				_t13 = _a4;
          				 *((intOrPtr*)( *_t13 + 8))(_t13);
          				 *[fs:0x0] = _v24;
          				return _v8;
          			}













          0x00423de2
          0x00423def
          0x00423df2
          0x00423df9
          0x00423e00
          0x00423e06
          0x00423e1d
          0x00423e23
          0x00423e29
          0x00423e34
          0x00423e3f

          APIs
          • #690.MSVBVM60(Underfeature2,boardwalks,trophoplasmatic,nonvital,?,?,?,?,00401316), ref: 00423E1D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: #690
          • String ID: Underfeature2$boardwalks$nonvital$trophoplasmatic
          • API String ID: 2608397304-685263129
          • Opcode ID: 3a5174c50cdb7e2d05a09dbb6d0363c42d1e578427f150ecea44b3233256b174
          • Instruction ID: ca91bac600f65f2ae0b89a027047624bc19171f814d5bdff6376a963ec8668ff
          • Opcode Fuzzy Hash: 3a5174c50cdb7e2d05a09dbb6d0363c42d1e578427f150ecea44b3233256b174
          • Instruction Fuzzy Hash: CDF068B5640208FFC300EF88D945F59BBF8FB49B41F10816AF505B7690C7785944CB95
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID: %q[K
          • API String ID: 560597551-1541054192
          • Opcode ID: 1b5a2fa1b0d6bc830ef4f96b174a2570e7a4e904bd8d1094eee9f847cdebc5fb
          • Instruction ID: aebca70f6ba3c56aa214ddf9069c4e5aaa33b0f921610b18767e2073781e9108
          • Opcode Fuzzy Hash: 1b5a2fa1b0d6bc830ef4f96b174a2570e7a4e904bd8d1094eee9f847cdebc5fb
          • Instruction Fuzzy Hash: 06410372A843449BE7349E3889D97DA7BE6FF88300F8A421E9D5597189D3B44689CF02
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID: %q[K
          • API String ID: 560597551-1541054192
          • Opcode ID: 6f30a30ae56fc109830ced1c01f15f4497f53d7a37979e9d1b28ac4efe4c51fc
          • Instruction ID: 3dbedfd2144462aaf5ae15530071616f23c5d257d8e7ac37a153e686781ec3ff
          • Opcode Fuzzy Hash: 6f30a30ae56fc109830ced1c01f15f4497f53d7a37979e9d1b28ac4efe4c51fc
          • Instruction Fuzzy Hash: 3C41E7B29897809EE7259E348CDD3967BB1BF46304F8A015BDE94870D2D3B44999CB42
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID: %q[K
          • API String ID: 560597551-1541054192
          • Opcode ID: 11b6bd921e54c78354af8ee0f28343d333677c9d3eecc808e46f6e632f20d76c
          • Instruction ID: dae57274da48a1ad740cde5bfbe710e65e259c02c17d62ecdaa43cdd9f2067c2
          • Opcode Fuzzy Hash: 11b6bd921e54c78354af8ee0f28343d333677c9d3eecc808e46f6e632f20d76c
          • Instruction Fuzzy Hash: A911ED3568C3808FDB221E348DE13DA7BB1AF06200F8A009ECDC59B596C7B9098AC712
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e15389b616b366a077d68c6a3d1bc218a0509b4334e81f9220801466bde01adb
          • Instruction ID: e3d171ec301e4aabe8369f82d434e34607082fb82ac7758355c57c6e4ae15c23
          • Opcode Fuzzy Hash: e15389b616b366a077d68c6a3d1bc218a0509b4334e81f9220801466bde01adb
          • Instruction Fuzzy Hash: 3A9158B3AC4B89AAE334AE39C9C93953BE6FFC8710B5D421AD6954B0D1D3E05584CF01
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: b1829642669a1e9cd4f9ab9d88a74d3ad15ff3ca666f1d19a2825e3961b5d380
          • Instruction ID: afeccbd3b5df7189802372c1f0eb67fb35120f23677587ca9361180424887485
          • Opcode Fuzzy Hash: b1829642669a1e9cd4f9ab9d88a74d3ad15ff3ca666f1d19a2825e3961b5d380
          • Instruction Fuzzy Hash: 1851E6F2DCC649DADB385E2989C43E566B5FF9470CF9A012BD82A57180D3F05B44CE46
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 18de17e95f6664fc6c707dd6aad659157ed74202022a05d9f41f7936f9ce17a6
          • Instruction ID: 5f0b8beef263c2a0eab4d773f60089a87100917bb95b794673a304cfa16c41db
          • Opcode Fuzzy Hash: 18de17e95f6664fc6c707dd6aad659157ed74202022a05d9f41f7936f9ce17a6
          • Instruction Fuzzy Hash: 904125B39CC24ADADB385E2AC9C43E166B5FFA460CF8A02179C2A17181D3F05B45CA56
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID:
          • API String ID: 560597551-0
          • Opcode ID: 00c73173b9bbcdf15f2f54e7c134df426618f66e46b6801e910dbad3d9a7c6c3
          • Instruction ID: 5c9824d69ab38d06d4075ea03a82162cab04c2a6f171ee31a40406366890714f
          • Opcode Fuzzy Hash: 00c73173b9bbcdf15f2f54e7c134df426618f66e46b6801e910dbad3d9a7c6c3
          • Instruction Fuzzy Hash: FC4115B2A847859FE325AE38D8E42D67BF4FFC9B00F8A015EC5958B192D3A44584CF05
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumWindows.USER32(?,?,00000000,?,?,00000040,00000000,?), ref: 02100CB2
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: EnumWindows
          • String ID:
          • API String ID: 1129996299-0
          • Opcode ID: e8cfdca136cbf8b0772b0ae2235b98765e7baccd3b5bcc977f603afc66ead9b7
          • Instruction ID: 56e26ee548eba0a90a9df524a2d829a79ff42e185953334c79c821c55e60381c
          • Opcode Fuzzy Hash: e8cfdca136cbf8b0772b0ae2235b98765e7baccd3b5bcc977f603afc66ead9b7
          • Instruction Fuzzy Hash: B0414CB3A84B499AE7599F38C9C43D43BE0FF9D300F5D525AD0995B095C3A3A588CB11
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b7b7b6219e07688201206f215f5963684a313aec16b9d63b1bdb00594e82b0c0
          • Instruction ID: 4b100b9100225956c7ad11a935a6707defe2a5c7697dd02b6f65696e2303745b
          • Opcode Fuzzy Hash: b7b7b6219e07688201206f215f5963684a313aec16b9d63b1bdb00594e82b0c0
          • Instruction Fuzzy Hash: BC412AB39CCA4DD6A738AE29C9C429166A5FFE470CB9E1217842A071C5C7F04B85CF42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e72de2a72e3f4b7bfa464f1d987f6ea3a4d8712147ae30aa16424c01e551eaac
          • Instruction ID: 15f03631da2aa9cb63463e5f4bedb1ecdbf21602b252f6ee93e89111b7a7e923
          • Opcode Fuzzy Hash: e72de2a72e3f4b7bfa464f1d987f6ea3a4d8712147ae30aa16424c01e551eaac
          • Instruction Fuzzy Hash: 314136B29CC249DADB385D2A8DC43E666B5FFA864CF8B01179C2B571C0D3F05B44CA52
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumWindows.USER32(?,?,00000000,?,?,00000040,00000000,?), ref: 02100CB2
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: EnumWindows
          • String ID:
          • API String ID: 1129996299-0
          • Opcode ID: eae38337472ab9733b6c19ebc5f3b427cbcafd30088f43777ebb41eadf39f79d
          • Instruction ID: a0d012456e0cc21ffcf19ca840db5ab87c5f2ba9953e94c4f7091d8869486ca7
          • Opcode Fuzzy Hash: eae38337472ab9733b6c19ebc5f3b427cbcafd30088f43777ebb41eadf39f79d
          • Instruction Fuzzy Hash: 83413A71A8878CAFD7759F3889D83D53BE1BF9A310F58459BD4888B192C3B0858DCB12
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 238e8e7142e647017a4b025b271b3b5c4f4a3e61d6227408c42bed30e7337338
          • Instruction ID: 772daa5ae546a5bd83df60b7cf671421f94e5cd1e61afb9a3002e608580e73ae
          • Opcode Fuzzy Hash: 238e8e7142e647017a4b025b271b3b5c4f4a3e61d6227408c42bed30e7337338
          • Instruction Fuzzy Hash: 5831D7F39DCA85DAA7286E29C8C4291E6B4FFE470DB9E12179569071C193E24784CF42
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 4a536a1fbe4e9e78091475d0cd227ebd5d2bd6b7c9ad433c06e5a96bbc8fc820
          • Instruction ID: 4879b036cf7002eb6829705d819c1a3c701af131fd6d2b0ff11c5be7da6454a4
          • Opcode Fuzzy Hash: 4a536a1fbe4e9e78091475d0cd227ebd5d2bd6b7c9ad433c06e5a96bbc8fc820
          • Instruction Fuzzy Hash: 944123B29CC249DBDB385E298DC43E666B5FFA461CF9A02179C2A57284D3F01B01CE52
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: a7915cfb725d0aab32d2c3880adeb44075fe5389c1977aec2a95a2d42e247f2a
          • Instruction ID: 1254edb7354f599216e443626e332d84818f0258ab43cec7df587e06bc1d997a
          • Opcode Fuzzy Hash: a7915cfb725d0aab32d2c3880adeb44075fe5389c1977aec2a95a2d42e247f2a
          • Instruction Fuzzy Hash: CE312AB29CC249DBDB385D2A89C43E666B5FFA861CF9A01178C2E571C0D3F05B44CE56
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • TerminateProcess.KERNELBASE(74763EEF), ref: 0210942A
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: ProcessTerminate
          • String ID:
          • API String ID: 560597551-0
          • Opcode ID: 24b0836c4ff1b8e7a6057102a516ce3796abe12fd7d9aede89d2ac662578c65f
          • Instruction ID: 6d613178a932bc61529d004cd5feae8bc48686257f6aee8c9b1af7bacbb9f24f
          • Opcode Fuzzy Hash: 24b0836c4ff1b8e7a6057102a516ce3796abe12fd7d9aede89d2ac662578c65f
          • Instruction Fuzzy Hash: 3331E4B2A84B819AE725AE39DCF82877AE4FFC4F01B8D115A85958F1D3C7E04555CF02
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 1c8b0683902fde1b1b4890c4beabcb5560a35bcb75844b413a615204063fd665
          • Instruction ID: 861d97f71e9a3aeaf5746c1696ff9203c3ccb8e7216772b3c2e96df89f8abce2
          • Opcode Fuzzy Hash: 1c8b0683902fde1b1b4890c4beabcb5560a35bcb75844b413a615204063fd665
          • Instruction Fuzzy Hash: 2B3159B29CC249DBDB385D29CDC43E666B5FFA460CF9A02179C2A07288C3F04B44CE52
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 6dda469d37a2cb184b737e0f85846576d88c30941acf35ce0431249b232d874b
          • Instruction ID: 8d7df6476903ac2e108fe9b95ed46cdaf7e16d291f0b40d370dc35a757ce3902
          • Opcode Fuzzy Hash: 6dda469d37a2cb184b737e0f85846576d88c30941acf35ce0431249b232d874b
          • Instruction Fuzzy Hash: 0021F9B29C8645DAD7389E28D8C86D5F7F5FBA4708BAA02178769472C1D3F01B41CE51
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 8dbe2e5c87750879287073a3bb30e8ccf910f176343c63d3430aa1a5a5120cc8
          • Instruction ID: 34f50ac22b2fa4d8cdd7e1e6194b646364da6b475a4c0bce4fdd3c9ccd267065
          • Opcode Fuzzy Hash: 8dbe2e5c87750879287073a3bb30e8ccf910f176343c63d3430aa1a5a5120cc8
          • Instruction Fuzzy Hash: E021F8B25C8649DAD7389E19CCC46D1A6B5FFA470CA9A02178A6907181C3F11740CF51
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • EnumWindows.USER32(?,?,00000000,?,?,00000040,00000000,?), ref: 02100CB2
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: EnumWindows
          • String ID:
          • API String ID: 1129996299-0
          • Opcode ID: 1847e3a938856e041fa025e1f076960ffc7874f8b376593c788c5d45ac9a546b
          • Instruction ID: e789f1c2054b0a3008ea0cc2f246a5ac20e59a860c233c27b43abfc61dde7270
          • Opcode Fuzzy Hash: 1847e3a938856e041fa025e1f076960ffc7874f8b376593c788c5d45ac9a546b
          • Instruction Fuzzy Hash: CD210371A4434D9FDB648E38C9D83EA77A2BF59310FA4852AD889CB256D3718A85CB01
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 44fefe9f7c4c48b6c1dbeb4545fdcb4470f2786af2fb6acd4dbeb17f54225cb0
          • Instruction ID: a4fd3582543190e40f4d6aa0cb30066b0cf9f8e254bad579832ae412a747cc0b
          • Opcode Fuzzy Hash: 44fefe9f7c4c48b6c1dbeb4545fdcb4470f2786af2fb6acd4dbeb17f54225cb0
          • Instruction Fuzzy Hash: 8A11E9F3AC8A49DAE7349E39CCC869D67A4FBA8708B9E0307D569475C5C3B05B50CE81
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: adca688e2e72bf3d46336ba4b51798fd8ff0571aa4f16ebc0a92e39d19d2e910
          • Instruction ID: d6f01d3bb4026fdaa5bf83ac0166055ec59353ecbee6bd7682562ca7d82ee6b1
          • Opcode Fuzzy Hash: adca688e2e72bf3d46336ba4b51798fd8ff0571aa4f16ebc0a92e39d19d2e910
          • Instruction Fuzzy Hash: D601A7FBAC0985A6B734AE3CC8C8F8566E8FBD4704B8D53079655060DD83B04544CED1
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: ff3522cc80d39a73da74e09f3439f091d3f51705edd02bba9f6ba8389defbd92
          • Instruction ID: de744213015a8de1fd05e93f04b9a209a832a8d3598fc5491c4e0188eeef6f09
          • Opcode Fuzzy Hash: ff3522cc80d39a73da74e09f3439f091d3f51705edd02bba9f6ba8389defbd92
          • Instruction Fuzzy Hash: F2F086FBAC098695A738AE39C8C8A806AA4FBE8B05B9C53079565161DD43B00994CEC5
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 89529ad1e05ce6ba45b4470ab1a55f6f1c0de29bd5f061e00adc5290102bfe97
          • Instruction ID: 00d4d280d33a1650bbe2e25dec27a194e95a47f9789a8c02c35e21931b82db41
          • Opcode Fuzzy Hash: 89529ad1e05ce6ba45b4470ab1a55f6f1c0de29bd5f061e00adc5290102bfe97
          • Instruction Fuzzy Hash: E1F030F3AC0D86E6B328AA2DD8C91406AF4FBF9B0668D23079175561D197F00D90CEC5
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • CreateFileA.KERNELBASE(0000A3E5,89B249F4,-00000001F1D129A7,214D1B82,-20FB2893,-61BEF55F,-AD6097E2,0210B588,A62E25CF), ref: 0210C185
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 79cbb4ab3261adb549ce80f3b472c4f4ddae104f997ae4ad801b0903e09ab4bf
          • Instruction ID: 854646e969d93d1a41cb11b0754c647679d322ca2e947a12a15f91c736f32a25
          • Opcode Fuzzy Hash: 79cbb4ab3261adb549ce80f3b472c4f4ddae104f997ae4ad801b0903e09ab4bf
          • Instruction Fuzzy Hash: F4F01CF7E80986F6B325AA39C8C96806AF4FBF8B0569D23479129160D153B04D94CED5
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669580214.0000000002060000.00000020.00000001.sdmp, Offset: 02060000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2060000_41609787.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 419940e7749f6dbeea4cb8745417377563d30f4aa1c692a2e17406000fc9d882
          • Instruction ID: eb71e0ccb10e0241a4b1be8d8a0d7d7a8adb8f99506b8fb7b515f990ed0a6afc
          • Opcode Fuzzy Hash: 419940e7749f6dbeea4cb8745417377563d30f4aa1c692a2e17406000fc9d882
          • Instruction Fuzzy Hash: 9BD05E7130F280BFD3099B248D269E63FF4EF82225F0909EAF544DB253E6159D058366
          Uniqueness

          Uniqueness Score: -1.00%

          Non-executed Functions

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: T5o$]2V$
          • API String ID: 0-2236104366
          • Opcode ID: d6904dc67f5f977c3d7373e1aa0af81512dce80c862aeceaadf9c3f1d010756d
          • Instruction ID: ccee979d409420fa0dee04b5aa4e0009a388712664195516c6acbf91fe504a46
          • Opcode Fuzzy Hash: d6904dc67f5f977c3d7373e1aa0af81512dce80c862aeceaadf9c3f1d010756d
          • Instruction Fuzzy Hash: 40A199726843499FDB359F79CCC83DA7BE2BF8A350F6A411ACC895B280D3B04945CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: T5o$]2V$
          • API String ID: 0-2236104366
          • Opcode ID: 22d7bcbbc319f531bb624394c915c22a745c3cdca436d7615d4eabac9e104faa
          • Instruction ID: 597e4b6c74958ff608be1b2bd143258fee02d8395f424fd2274ed26ab9723a67
          • Opcode Fuzzy Hash: 22d7bcbbc319f531bb624394c915c22a745c3cdca436d7615d4eabac9e104faa
          • Instruction Fuzzy Hash: 42A158726843499FDB259F39CCC83CB7BE2BF89350F6A411ACD895B194D3B05A45CB12
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: T5o$]2V$
          • API String ID: 0-2236104366
          • Opcode ID: 480fa2343097af30aa0496ef9244304ea3539899b6ebd7aae93f55fa00634b47
          • Instruction ID: 05a82261ff1b1f3631a582daa14e689301f21fb475d58885595dbb6f9e64ea90
          • Opcode Fuzzy Hash: 480fa2343097af30aa0496ef9244304ea3539899b6ebd7aae93f55fa00634b47
          • Instruction Fuzzy Hash: 25A16972644349CFDB319F39CC983DB77A3AF89350F66412ACC899B285D3B48A41CB51
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: Fs+9
          • API String ID: 0-3774446485
          • Opcode ID: fb04e346100a597eb4c16b028abe95848968c35128e4077b75e31ae0a942c04c
          • Instruction ID: f254c46c0318e37da00396f1f0165be4718ccca230b27ab9d12b5d4330219307
          • Opcode Fuzzy Hash: fb04e346100a597eb4c16b028abe95848968c35128e4077b75e31ae0a942c04c
          • Instruction Fuzzy Hash: D5E1E271644689EFDB28CF28CCD47EA77A2FF49300F99812ADC9987281D770A945CF91
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: U4X^
          • API String ID: 0-4507247
          • Opcode ID: 1fb461925fdd2414b45e849d7818e35033bfedaf9902dfd487bd25fd2ce7d8ec
          • Instruction ID: 58b0e231cf733314c0c8825b346c7954d2331c34b9b5c846360c7cb913aad6bb
          • Opcode Fuzzy Hash: 1fb461925fdd2414b45e849d7818e35033bfedaf9902dfd487bd25fd2ce7d8ec
          • Instruction Fuzzy Hash: 92A15471A443499FDB389E29C9907EE77F3EF84350F66842DDD8A97244D3719A81CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: ]2V$
          • API String ID: 0-4012779422
          • Opcode ID: 4e5bb0fb178e8621710776ae2ee4ed0f7b84e3051654a380396ad554eb36a93d
          • Instruction ID: 9ab2cad1ba7bf13514ded5c0e26946d7dfbe8ba111f25235ceced0798997e8c4
          • Opcode Fuzzy Hash: 4e5bb0fb178e8621710776ae2ee4ed0f7b84e3051654a380396ad554eb36a93d
          • Instruction Fuzzy Hash: 7C918A726843898FDB259F39CCC83DA7BE2FF89350F6A411ACD855B191D3B04946CB12
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID: ]2V$
          • API String ID: 0-4012779422
          • Opcode ID: 506a616e6d7ba74d13ddffc356fdaa193a285a9eacab6ea0bc856e263d76eb4f
          • Instruction ID: 97fc1231838690dd570d17c3b8fe7fe9253137e3bc58e50466db44b37c494cbd
          • Opcode Fuzzy Hash: 506a616e6d7ba74d13ddffc356fdaa193a285a9eacab6ea0bc856e263d76eb4f
          • Instruction Fuzzy Hash: 85617972644389CFDB319F38CCD83DA7BA2AF85350F6A411ACD895B285D3F49941CB16
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fae57231f575607df2a77974f49ac3b562f9ee9bf1bacd713cfea8d13f389f1f
          • Instruction ID: 879175d0e00bf887e78f3b679e30f73192a4593937fe662b8f171c081b2f110e
          • Opcode Fuzzy Hash: fae57231f575607df2a77974f49ac3b562f9ee9bf1bacd713cfea8d13f389f1f
          • Instruction Fuzzy Hash: 2DA14472A443859FDB349E69C8D53EA7BF2FF84350F5A402EDD8997244E3718982CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f6a52dc9c5b737c96b14b99348be57c2714c62ec6dcbddeb5c0dc95698694f8d
          • Instruction ID: 37eeec86d3c6f91d602c0a72e1ca2af8b83d939de838a58544fd9c9932c39ad3
          • Opcode Fuzzy Hash: f6a52dc9c5b737c96b14b99348be57c2714c62ec6dcbddeb5c0dc95698694f8d
          • Instruction Fuzzy Hash: C5715572A807898FDB249E29C8D13EA77F2FFC5750F5A852EDE8997240D3715981CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6ee9b74c65cd762a92dec980fab64425378888db87cd6606663a63fee290b6c9
          • Instruction ID: 903df4a6f74fa3bcfce1fc1729b144d400ab2cb56549b3bd14f57445f3596f5f
          • Opcode Fuzzy Hash: 6ee9b74c65cd762a92dec980fab64425378888db87cd6606663a63fee290b6c9
          • Instruction Fuzzy Hash: 36712371A44389DFCB349E2589D17EE77F3AF84390F56842DDD8997244D3719A82CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 217afecc622d10158e356d4cba81616c42b2d1d8fe928b135c9c3c4b68d7d2fd
          • Instruction ID: 42ebda08a9616fc2fe14d6b107835c2c57f4386a0659b3f6e6206bd0a3221316
          • Opcode Fuzzy Hash: 217afecc622d10158e356d4cba81616c42b2d1d8fe928b135c9c3c4b68d7d2fd
          • Instruction Fuzzy Hash: 31717635D883858BDB35CE3888D63CA7BA39F52360F59C26A8C994B2CAD7744542C752
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 851a39a1237339df4b278b4966462b04561db078f1992352b2288ea41a651f44
          • Instruction ID: 0acc1d0da3a1781f01070cd7d9aba0d2360274c392ea688831dc96850ce1c9ce
          • Opcode Fuzzy Hash: 851a39a1237339df4b278b4966462b04561db078f1992352b2288ea41a651f44
          • Instruction Fuzzy Hash: 346134B26807899FE730CE24CAD47C77BF6FF56700F95052ACD4A8B281D375AA568B01
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 274a4b2512253ea92a97f5ab8817235441a18e819332087cf07065fb5af3e758
          • Instruction ID: f152656f06005f5532066bf9d15975c5a868f1a6320279759efdcca7d9c61a79
          • Opcode Fuzzy Hash: 274a4b2512253ea92a97f5ab8817235441a18e819332087cf07065fb5af3e758
          • Instruction Fuzzy Hash: B4617672A843C58FDB24AE6988D13EA77F2FFC4750F5A442EDE899B150D3B04981CB46
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 95e8918cdd769f10ed2bd03a808e1070d8531124f0eb5f5c39a5eec5715ed3c2
          • Instruction ID: 6e56cde124be0e72d65675af529381a009b39e0b20054e335216399c6b922021
          • Opcode Fuzzy Hash: 95e8918cdd769f10ed2bd03a808e1070d8531124f0eb5f5c39a5eec5715ed3c2
          • Instruction Fuzzy Hash: 366143B26807C99FD7308E25CAD47C63BE5FF46704F89022ACD898F185D3B5AA56CB01
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6c9cca172bea34bb0bc1443d8ebb4aaac01952966a70420d0380724469322e1d
          • Instruction ID: c0485fd99964bf583fc31f15c2624f87a05b475e294eaebe92c9a5fba3269014
          • Opcode Fuzzy Hash: 6c9cca172bea34bb0bc1443d8ebb4aaac01952966a70420d0380724469322e1d
          • Instruction Fuzzy Hash: 0E615771A44389DFCB349E2989917EFB7F3AF84790F56842DDC8997204D3719981CB42
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b5a9a9a88545142ee85eec2c7a6f06f93e78735458c04d6d748887d414f05605
          • Instruction ID: 4e3587dabeb463f7a3606f88677ef9293d1b79f28fe642f635cf1879d5b516ff
          • Opcode Fuzzy Hash: b5a9a9a88545142ee85eec2c7a6f06f93e78735458c04d6d748887d414f05605
          • Instruction Fuzzy Hash: EF513772A443C68FD721AF2588D12EABBF2FF85714F5A046ECEC55B252C3705986CB06
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a599c010185f0cfa9137492ca64d38ff1044c25801fc17031560751accb42d7e
          • Instruction ID: d92fa5214b418c39eb86f1b88e0d2c17825b53f4d5c1466012d81bad332ecb2f
          • Opcode Fuzzy Hash: a599c010185f0cfa9137492ca64d38ff1044c25801fc17031560751accb42d7e
          • Instruction Fuzzy Hash: 9B519972984389CFEB389F7489857DA77BAFF05350F8A412ECD995B191C3B04984CB82
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 78b842daa406e806f06c471f7ff5737449a467f9d9aec33c8b0da4f4372961d4
          • Instruction ID: 7e71aa09d865305db26304493db6f967d91c8c53a9029fc592b7dbb1cc847681
          • Opcode Fuzzy Hash: 78b842daa406e806f06c471f7ff5737449a467f9d9aec33c8b0da4f4372961d4
          • Instruction Fuzzy Hash: 74513772E887C18FEB3A9F7888D43417FE8BF86714B4E82DAC4A54A1D3D36144A5C702
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: efab7fc34e357e3530f7e288eca177710e844a772663acb55665ddeddfadc636
          • Instruction ID: ceba4c2e45696381e0e4a21f8dff4bff2511fd4ea27d41a124facc0d23116d0f
          • Opcode Fuzzy Hash: efab7fc34e357e3530f7e288eca177710e844a772663acb55665ddeddfadc636
          • Instruction Fuzzy Hash: F55131B2A847C59FD7308E26C9C47C67BF5FF85300F58066ACD898B185D376A996CB00
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 891eb0ebb7f54905e1d0ad3ab1fbc294464e5a98a9bf78624ec208d876d6b9ae
          • Instruction ID: 956b550b62005f51cd16d454396ff36852651cfe7883d13cdf928301a4c6d8aa
          • Opcode Fuzzy Hash: 891eb0ebb7f54905e1d0ad3ab1fbc294464e5a98a9bf78624ec208d876d6b9ae
          • Instruction Fuzzy Hash: 935138726803499FDB30CE64CED4BDB77F2AF19704F95062ACD4A8B684D375AA46CB01
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7c5abf485f79d29760e6714b200abbc3a27af9610537739a73ec6d6512d9fdb1
          • Instruction ID: 7073174e282df13a30cfb9c1dac4811817e3c816f1b51c2fb76946525206a0ed
          • Opcode Fuzzy Hash: 7c5abf485f79d29760e6714b200abbc3a27af9610537739a73ec6d6512d9fdb1
          • Instruction Fuzzy Hash: 364168BB9847818BE328AE3AC8C139A7BF0FFC4760F4A011DDAD757190D3A05581CB05
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 53e0604ee703df79173ce9c6852736cb04969a95332ac01825b89336abcc2ef1
          • Instruction ID: 1a7daf3e6409b9f5ef06ba11c97ad0daea6cd4a5c07c713352608a434d212e32
          • Opcode Fuzzy Hash: 53e0604ee703df79173ce9c6852736cb04969a95332ac01825b89336abcc2ef1
          • Instruction Fuzzy Hash: 97313972E487C18AEB399E7888C47527AD5BB96324F8DC39EC8A94B0D7D3718552C702
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 17c326be4121b017a8ac1a8e7570c7c8ddca9ee7fdc8cdca36a227af3f66ec7c
          • Instruction ID: 0d5f1d77deaeda77030ccbca8d972ea3c1e4798cb70a04b749f5297fdad86ec2
          • Opcode Fuzzy Hash: 17c326be4121b017a8ac1a8e7570c7c8ddca9ee7fdc8cdca36a227af3f66ec7c
          • Instruction Fuzzy Hash: D831F331A483858BDF35CE78C5D07967BD29B46324F49C2AEC8998B2DBE7718942C742
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 893d25fab411a4b331fee3814ceb1dae62daf0acac9c9f0c62d391dae4536a02
          • Instruction ID: 9aae8af049b106ad59ba20af6cc1c7117f4a832a0848516184a589d1996ad5f7
          • Opcode Fuzzy Hash: 893d25fab411a4b331fee3814ceb1dae62daf0acac9c9f0c62d391dae4536a02
          • Instruction Fuzzy Hash: F3214D3524834BCFCB349EB8D4D03DA7352EF46714F8A421ADD9B8B691E3715981C742
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f0bff9af6f64b8a261feeff58184b9bef44ec40584bc27c947084f8ab4a24160
          • Instruction ID: 85dbc076dfd759f2fa3dd3f4a2756d7e8ddd79f3d28d62d9c397541fca2e87d8
          • Opcode Fuzzy Hash: f0bff9af6f64b8a261feeff58184b9bef44ec40584bc27c947084f8ab4a24160
          • Instruction Fuzzy Hash: 512165317453068FEF38AE748AB53EA36A1EF443A0FD1882EDDD786699C7715580CA03
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ebee893e327ba1b4ad2266ec75b82d1d7cc2dc47efa5051b1acfc66aeb651f54
          • Instruction ID: 2426c25026d0f29cf29af2d11c250140eb5a2389be7a37c5c70d8579e394f742
          • Opcode Fuzzy Hash: ebee893e327ba1b4ad2266ec75b82d1d7cc2dc47efa5051b1acfc66aeb651f54
          • Instruction Fuzzy Hash: B111E735A48345DFEB686E748E863FB7AE6EF42254F86842DCCD6CA108D3358595CB03
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 411dffa952c3aab7b98ae45f13e0f2cbe87010baa5f59ce3f55374670cb7639f
          • Instruction ID: 3186682195174d30ada071934b2fb2088a05b4b44a1f381305968c04c7e58329
          • Opcode Fuzzy Hash: 411dffa952c3aab7b98ae45f13e0f2cbe87010baa5f59ce3f55374670cb7639f
          • Instruction Fuzzy Hash: AC11D535A48345DFEB68AF748E863FA7BE6EF42254F86842DCCC5DA108D3354595CA03
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0a1a2a7f628ae489c048853511f0eb489a827ee6b0ee2e161a8d9e8810acd524
          • Instruction ID: 54e9640fcd951fab765965e792f43dd6de64c3d534667f75f34442fc6129c4ac
          • Opcode Fuzzy Hash: 0a1a2a7f628ae489c048853511f0eb489a827ee6b0ee2e161a8d9e8810acd524
          • Instruction Fuzzy Hash: 50012571A883498FDB24DF68D9C4BD973B2FF59714F81803AD9088B619C770AA40CB50
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e0ec8044d55284a10f5932728e6c4a76dbf9d83842d798d8e448099b51cb11e3
          • Instruction ID: a026a310f9d08bb1d858143eb29fddbf5fc3d9bc52f9beb0b7c2352c6f2dcf67
          • Opcode Fuzzy Hash: e0ec8044d55284a10f5932728e6c4a76dbf9d83842d798d8e448099b51cb11e3
          • Instruction Fuzzy Hash: CDB002B66515819FEF56DB08D591B4073A4FB55648B0904D0E412DB712D224E910CA04
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000000.00000002.669650402.0000000002100000.00000040.00000001.sdmp, Offset: 02100000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2100000_41609787.jbxd
          Yara matches
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ec12b8e93eae30d63e59dd76028af381413cbf4e66a037168c46ec61f0662275
          • Instruction ID: b09643351c387927486e8bd246cc4a6b2b826b9fb4c98d96abe5f4fa44092c45
          • Opcode Fuzzy Hash: ec12b8e93eae30d63e59dd76028af381413cbf4e66a037168c46ec61f0662275
          • Instruction Fuzzy Hash: BAB00275656A418FDA55DB09C290E4073A4B745754B855491E8118BB21D264E900CA11
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 0041F88D
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F8AC
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E40,000001E8), ref: 0041F8CB
          • __vbaFreeObj.MSVBVM60 ref: 0041F8D4
          • __vbaVarDup.MSVBVM60 ref: 0041F8F4
          • #518.MSVBVM60(?,?), ref: 0041F902
          • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041F927
          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041F93A
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 0041F95F
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F978
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000108), ref: 0041F99B
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 0041F9B4
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F9CD
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E70,00000130), ref: 0041F9F0
          • __vbaNew2.MSVBVM60(00403EA0,00425B90), ref: 0041FA08
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,0000004C), ref: 0041FA2D
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403EB0,00000024), ref: 0041FA59
          • __vbaStrMove.MSVBVM60 ref: 0041FA68
          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041FA78
          • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 0041FA8C
          • #610.MSVBVM60(?), ref: 0041FA9F
          • __vbaStrVarVal.MSVBVM60(?,?), ref: 0041FAA9
          • #540.MSVBVM60(?,00000000), ref: 0041FAB4
          • #610.MSVBVM60(?), ref: 0041FABE
          • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041FAC8
          • __vbaFreeStr.MSVBVM60 ref: 0041FAD4
          • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 0041FAE8
          • #580.MSVBVM60(markeringsfelter,00000001), ref: 0041FAFD
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 0041FB16
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041FB2F
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403EE8,00000158), ref: 0041FB52
          • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 0041FB62
          • __vbaI4Var.MSVBVM60(00000000), ref: 0041FB6C
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041FB7F
          • __vbaFreeVar.MSVBVM60 ref: 0041FB8B
          • __vbaFreeStr.MSVBVM60(0041FBE6), ref: 0041FBDF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$CheckHresult$ListNew2$#610$#518#540#580CallLateMove
          • String ID: markeringsfelter
          • API String ID: 528581227-1727724952
          • Opcode ID: 8b3763c0771f7e9da60432f301aaffca48600059144ff4fb6f9059b2153e0460
          • Instruction ID: 6ed78282c0e0dfc65efc494154929b8d47325c041ffe63739f112c7089930418
          • Opcode Fuzzy Hash: 8b3763c0771f7e9da60432f301aaffca48600059144ff4fb6f9059b2153e0460
          • Instruction Fuzzy Hash: 7DB14D70900209AFDB10DFA4DE89EEEBBB8FF58701F10452AF545F71A0D6746A45CBA8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60 ref: 0042131A
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421333
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421352
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,000001EC), ref: 0042139C
          • __vbaFreeObj.MSVBVM60 ref: 004213A5
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004213BE
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004213D7
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,000001EC), ref: 0042141E
          • __vbaFreeObj.MSVBVM60 ref: 00421431
          • __vbaNew2.MSVBVM60(00403EA0,00425B90), ref: 00421446
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,00000014), ref: 0042146B
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403FC4,000000C8), ref: 00421491
          • __vbaFreeObj.MSVBVM60 ref: 00421496
          • __vbaFreeStr.MSVBVM60(004214C2), ref: 004214BB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresult$New2$Copy
          • String ID: Forureningsforebyggende$meriting
          • API String ID: 642038886-873963558
          • Opcode ID: 87eaa6f25b9ae7aa4b6356673f76f3f564a2eac4d7c4c602d0c829d56279af76
          • Instruction ID: c1c17f59fe3f5836e9a273c6e7d346be82fc77614e50c3794a216425d0f859ca
          • Opcode Fuzzy Hash: 87eaa6f25b9ae7aa4b6356673f76f3f564a2eac4d7c4c602d0c829d56279af76
          • Instruction Fuzzy Hash: EA516170B00215ABCB10EF69DD45E9EBBF8FF58700F608529E545F72A0D778A901CBA8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60 ref: 00423E96
          • #711.MSVBVM60(?,00404240,?,000000FF,00000000), ref: 00423EBA
          • __vbaAryVar.MSVBVM60(00002008,?), ref: 00423EC9
          • __vbaAryCopy.MSVBVM60(?,?), ref: 00423EDA
          • __vbaFreeVarList.MSVBVM60(00000002,0000000A,?), ref: 00423EEA
          • __vbaGenerateBoundsError.MSVBVM60 ref: 00423F0C
          • __vbaGenerateBoundsError.MSVBVM60 ref: 00423F1E
          • __vbaStrCmp.MSVBVM60(00403E5C), ref: 00423F33
          • __vbaNew2.MSVBVM60(00403EA0,00425B90), ref: 00423F4F
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,0000001C), ref: 00423F74
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040410C,00000064), ref: 00423F9A
          • __vbaFreeObj.MSVBVM60 ref: 00423FA3
          • __vbaAryDestruct.MSVBVM60(00000000,?,00423FEA), ref: 00423FDA
          • __vbaFreeStr.MSVBVM60 ref: 00423FE3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$BoundsCheckCopyErrorGenerateHresult$#711DestructListNew2
          • String ID: +k
          • API String ID: 1597829538-3989395270
          • Opcode ID: b451d9d85d1f8c41eaf2be55f88c6b94184aa05a493f443232ab0f6abfc3b658
          • Instruction ID: 5dcaf1cad6a84874b2b78185fac9bb9ec712439a22ed8a164488a7fb13f06a2a
          • Opcode Fuzzy Hash: b451d9d85d1f8c41eaf2be55f88c6b94184aa05a493f443232ab0f6abfc3b658
          • Instruction Fuzzy Hash: 60416170E00209EFDB00DF94EA49EEEBBB8FF54701F20411AE505B72A0D7786946CB68
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60 ref: 00421708
          • __vbaStrCopy.MSVBVM60 ref: 00421710
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421725
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421744
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 0042175B
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00421774
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,000000F8), ref: 00421799
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,000001EC), ref: 004217DE
          • __vbaFreeStr.MSVBVM60 ref: 004217E7
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 004217F7
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00421813
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042182C
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,000001B0), ref: 00421868
          • __vbaFreeObj.MSVBVM60 ref: 00421871
          • __vbaFreeStr.MSVBVM60(004218BB), ref: 004218B3
          • __vbaFreeStr.MSVBVM60 ref: 004218B8
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$CheckHresultNew2$Copy$List
          • String ID:
          • API String ID: 4106465447-0
          • Opcode ID: eece2ca8e8f0fee8757feb967212b8f54d183c594b487ce20a3d3cc519707415
          • Instruction ID: 70602980e93db9a70661584d4f6ca2f04027008388ff6b6d419a9bf48aace21c
          • Opcode Fuzzy Hash: eece2ca8e8f0fee8757feb967212b8f54d183c594b487ce20a3d3cc519707415
          • Instruction Fuzzy Hash: 70513D70A00215ABCB10DFA9DD88EAEBBB8FF58700F50816AF545F72A1D7749905CB98
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60 ref: 00424366
          • #672.MSVBVM60(00000000,40080000,00000000,3FF00000,00000000,3FF00000,00000000,3FF00000), ref: 00424384
          • __vbaFpR8.MSVBVM60 ref: 0042438A
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004243B4
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004243D3
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000068), ref: 004243F6
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00424413
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042442C
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000048), ref: 00424449
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 0042445E
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00424477
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,000001C0), ref: 0042449A
          • __vbaInStr.MSVBVM60(00000000,?,?,?), ref: 004244AC
          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 004244BC
          • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 004244D0
          • __vbaFreeStr.MSVBVM60(00424513), ref: 0042450C
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresultNew2$List$#672Copy
          • String ID:
          • API String ID: 472107970-0
          • Opcode ID: 2ef55511052479aeaea1381addfdf513325f7f6781ba42bef26aa8fb11154359
          • Instruction ID: 8b5d8c13027ed38e4a3f9325e63f3914e584f6c96f5fbdddf1a23aa6d321181f
          • Opcode Fuzzy Hash: 2ef55511052479aeaea1381addfdf513325f7f6781ba42bef26aa8fb11154359
          • Instruction Fuzzy Hash: F6515170A00214AFDB10EFA5DD89FEE77BCFB48700F508529F545F72A0D674A9458BA8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00422F72
          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00422F7A
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00422F8F
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00422FAE
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,000001EC), ref: 00422FF2
          • __vbaFreeObj.MSVBVM60 ref: 00423001
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00423016
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042302F
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,00000078), ref: 0042304C
          • __vbaFreeObj.MSVBVM60 ref: 0042305B
          • __vbaFreeStr.MSVBVM60(00423080), ref: 00423078
          • __vbaFreeStr.MSVBVM60 ref: 0042307D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$CheckCopyHresultNew2
          • String ID: Upstaters9
          • API String ID: 4138333463-3112961830
          • Opcode ID: fb1628d25ddf96275fc27dd22df7253d8fa449a695449a2bb0c9b51483c1d12d
          • Instruction ID: 5c2ff5969d47ad57664b2ea121a758146eb9d6181eb7b8eed283971510ab3695
          • Opcode Fuzzy Hash: fb1628d25ddf96275fc27dd22df7253d8fa449a695449a2bb0c9b51483c1d12d
          • Instruction Fuzzy Hash: 3B413070A00215ABCB10DFA5DD84A9EBBF8FF58700F508166E505F72A0D6789945CBA4
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60 ref: 00423A99
          • __vbaStrCopy.MSVBVM60 ref: 00423AA1
          • __vbaI4Str.MSVBVM60(0040419C), ref: 00423AA8
          • #698.MSVBVM60(?,00000000), ref: 00423AB3
          • __vbaVarTstNe.MSVBVM60(?,?), ref: 00423ACF
          • __vbaFreeVar.MSVBVM60 ref: 00423ADB
          • __vbaNew2.MSVBVM60(00403EA0,00425B90), ref: 00423AFC
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,0000001C), ref: 00423B21
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040410C,00000060), ref: 00423B6C
          • __vbaFreeObj.MSVBVM60 ref: 00423B75
          • __vbaFreeStr.MSVBVM60(00423BBE), ref: 00423BB6
          • __vbaFreeStr.MSVBVM60 ref: 00423BBB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$CheckCopyHresult$#698New2
          • String ID: Vatterede
          • API String ID: 2470338467-2435159309
          • Opcode ID: 51374ef2f8064294ef219f93a7ae8a92c67f9edcb47a86598a63e679d2b44f7e
          • Instruction ID: 1cd07d43e46d3fe7e11c5e36085065abff903fb04ba04c63ae0463a92ec42713
          • Opcode Fuzzy Hash: 51374ef2f8064294ef219f93a7ae8a92c67f9edcb47a86598a63e679d2b44f7e
          • Instruction Fuzzy Hash: AA416D74A012189FCB04DF95DA49ADEBFB8FF58701F20812AE405B72A4D7786E05CF98
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004232DD
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004232F6
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E70,00000190), ref: 0042331D
          • __vbaVarErrI4.MSVBVM60(?,?), ref: 0042332C
          • #559.MSVBVM60(00000000), ref: 00423333
          • __vbaFreeObj.MSVBVM60 ref: 0042334A
          • __vbaFreeVar.MSVBVM60 ref: 00423353
          • __vbaNew2.MSVBVM60(00403EA0,00425B90), ref: 00423374
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,0000004C), ref: 00423399
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403EB0,0000001C), ref: 004233E3
          • __vbaObjSet.MSVBVM60(?,?), ref: 004233F8
          • __vbaFreeObj.MSVBVM60 ref: 00423401
          • __vbaFreeObj.MSVBVM60(0042342C), ref: 00423425
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$CheckHresult$New2$#559
          • String ID:
          • API String ID: 3234916204-0
          • Opcode ID: 8e768211928ac7f1f439fd1b849b2eb858b4c049f7bf6ef87a6e6191d6b3c7ca
          • Instruction ID: e29c211e6bfc27328b97f23a138db38bdbd73d39bb5c9a2402b624bbe51dc319
          • Opcode Fuzzy Hash: 8e768211928ac7f1f439fd1b849b2eb858b4c049f7bf6ef87a6e6191d6b3c7ca
          • Instruction Fuzzy Hash: 6D415E70A00215ABCB10DFA5DD49AEEBBB8FF48701F50412AF545F72A0D7785945CFA8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60 ref: 0042153F
          • __vbaVarDup.MSVBVM60 ref: 00421567
          • #632.MSVBVM60(?,?,00000002,00000002), ref: 0042157B
          • __vbaVarTstNe.MSVBVM60(?,?), ref: 0042159D
          • __vbaFreeVarList.MSVBVM60(00000003,?,00000002,?), ref: 004215B4
          • __vbaNew2.MSVBVM60(00403EA0,00425B90), ref: 004215D8
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,0000004C), ref: 004215FD
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403EB0,0000002C), ref: 0042164D
          • __vbaFreeObj.MSVBVM60 ref: 00421656
          • __vbaFreeStr.MSVBVM60(00421692), ref: 0042168B
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$CheckHresult$#632CopyListNew2
          • String ID:
          • API String ID: 4107304827-0
          • Opcode ID: 3ab83ab2ea4a62bcf6c54e07782cc8aa70bacab5b7dede7664c2db3e2b791b17
          • Instruction ID: 2d91b493808bfb357edf09964de312456ebb686000fb7cd8523c619567063e15
          • Opcode Fuzzy Hash: 3ab83ab2ea4a62bcf6c54e07782cc8aa70bacab5b7dede7664c2db3e2b791b17
          • Instruction Fuzzy Hash: 93414BB0D00209AFDB10CF94D989AEEBFB8FF54701F50812AE509BB2A0D7746989CF54
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • #628.MSVBVM60(FGFG,00000001,?), ref: 004230F6
          • __vbaStrMove.MSVBVM60 ref: 00423101
          • __vbaStrCmp.MSVBVM60(0040417C,00000000), ref: 0042310D
          • __vbaFreeStr.MSVBVM60 ref: 00423120
          • __vbaFreeVar.MSVBVM60 ref: 00423129
          • __vbaFpI4.MSVBVM60 ref: 0042313F
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,004037E4,00000064), ref: 00423159
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$#628CheckHresultMove
          • String ID: FGFG
          • API String ID: 1677052577-2759163656
          • Opcode ID: 1593b2bf782ed43b15d3350475c4922dd1ff60502eedf35fcc540fdfa51c32a5
          • Instruction ID: 61e885fbcabe18465313e6b8560cf15d0f5a76fc84459a8d5102b1f5b05ab5fa
          • Opcode Fuzzy Hash: 1593b2bf782ed43b15d3350475c4922dd1ff60502eedf35fcc540fdfa51c32a5
          • Instruction Fuzzy Hash: 36119671D00214EBD7109FA4ED09BAEBB78FB08741F108125F941B72A0D7785944CBE8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 00423577
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00423596
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004235B2
          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004235CB
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F3C,00000048), ref: 004235E8
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,000001EC), ref: 00423628
          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423631
          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00423641
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresultNew2$List
          • String ID:
          • API String ID: 2509323985-0
          • Opcode ID: e3b24db23db38ead2d0ecc7448a1449291ba6cd5f900bf91e9b0843fd1a703b6
          • Instruction ID: aabde9bd3da2e8b816ea6023c3d78ea6243404b7b5868c84fa423846070f03ff
          • Opcode Fuzzy Hash: e3b24db23db38ead2d0ecc7448a1449291ba6cd5f900bf91e9b0843fd1a703b6
          • Instruction Fuzzy Hash: B2318170A00205AFC710DFA8DD49FAE7BBCFB48B01F508429F505F7291D7789A468BA9
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423C2A
          • __vbaLenBstrB.MSVBVM60(004041C0,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423C35
          • #568.MSVBVM60(000000CF,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423C45
          • __vbaNew2.MSVBVM60(00402320,00425010,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423C5E
          • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423C77
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,000000D8,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423C9E
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423CAD
          • __vbaFreeStr.MSVBVM60(00423CCE,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423CC7
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$#568BstrCheckCopyHresultNew2
          • String ID:
          • API String ID: 953296257-0
          • Opcode ID: d089c70892a454886be6306855cf49d4ed54bdc214dbfe9138d263edce3f9f96
          • Instruction ID: 296d23004f974bf400aba464725b3edd6b30393cad0263f209d9af11cf8ad095
          • Opcode Fuzzy Hash: d089c70892a454886be6306855cf49d4ed54bdc214dbfe9138d263edce3f9f96
          • Instruction Fuzzy Hash: 0721AC74A00204ABCB10DFA5DE89EEEBBB8EF48701F504526F542F36A0C7785945CB68
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 0042404A
          • __vbaNew2.MSVBVM60(00403EA0,00425B90,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00424062
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,0000004C), ref: 00424087
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403EB0,00000020), ref: 004240AB
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004240C2
          • #569.MSVBVM60(00000032,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004240CF
          • __vbaFreeStr.MSVBVM60(004240F0,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004240E9
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresult$#569CopyNew2
          • String ID:
          • API String ID: 291378957-0
          • Opcode ID: 603399e09e53dbc9f16acda24412b0a925df055bb00ecd2c9b14513361c557bc
          • Instruction ID: 57909598efba5fa1407c770153b94edd85a50b4e1e3aee7c9a3529e385419e9c
          • Opcode Fuzzy Hash: 603399e09e53dbc9f16acda24412b0a925df055bb00ecd2c9b14513361c557bc
          • Instruction Fuzzy Hash: DD21C170E00214ABCB10CF94DD89EAEBBB8FF48701F904216F605B72A0D7786941CB98
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00403EA0,00425B90,?,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004236E6
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,00000014), ref: 0042370B
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403FC4,00000058), ref: 0042372F
          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 0042373E
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423747
          • __vbaFreeStr.MSVBVM60(00423778), ref: 00423771
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresult$MoveNew2
          • String ID:
          • API String ID: 2347022188-0
          • Opcode ID: fd075fa189c37e8fa9c3856c88eb141c446a47d19b38db919b28f707619a3cd9
          • Instruction ID: 4cb06e2211cd6317e1f20c87e54b8c93e2009ec9a99abb75217ae554da3fbfc9
          • Opcode Fuzzy Hash: fd075fa189c37e8fa9c3856c88eb141c446a47d19b38db919b28f707619a3cd9
          • Instruction Fuzzy Hash: 282180B0A00208ABCB00DF55DD899EEBBF8FB48701F604016E501F32A0C7785901CFA8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00401316), ref: 004237E7
          • __vbaNew2.MSVBVM60(00402320,00425010,?,?,?,?,?,?,?,?,00401316), ref: 00423800
          • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,00401316), ref: 00423819
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403F2C,0000020C,?,?,?,?,?,?,?,?,00401316), ref: 0042383C
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,00401316), ref: 00423845
          • __vbaFreeStr.MSVBVM60(0042386E), ref: 00423867
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$Free$CheckCopyHresultNew2
          • String ID:
          • API String ID: 4138333463-0
          • Opcode ID: 27144af2c453efa3ce2eab04af54305ff2a7044efa7b26113643de9aebf81712
          • Instruction ID: ee09201bb749f5c44a78d203f95f0999bea34d2e40576e2d260101bed4fd0ceb
          • Opcode Fuzzy Hash: 27144af2c453efa3ce2eab04af54305ff2a7044efa7b26113643de9aebf81712
          • Instruction Fuzzy Hash: A511BF70A00205EBCB10EF65DE49EAE7BF8EB44701FA04525F941F72A1C7785905CBA5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 19%
          			E00423890(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
          				char _v8;
          				intOrPtr _v12;
          				intOrPtr _v16;
          				char _v28;
          				intOrPtr _v32;
          				intOrPtr _v40;
          				intOrPtr* _t17;
          				intOrPtr* _t19;
          				intOrPtr* _t21;
          				void* _t24;
          				intOrPtr* _t26;
          				intOrPtr* _t36;
          				void* _t37;
          				void* _t39;
          				intOrPtr _t40;
          				intOrPtr _t41;
          
          				_t40 = _t39 - 0xc;
          				 *[fs:0x0] = _t40;
          				_t41 = _t40 - 0x24;
          				_v16 = _t41;
          				_v12 = 0x401248;
          				_v8 = 0;
          				_t17 = _a4;
          				 *((intOrPtr*)( *_t17 + 4))(_t17, __edi, __esi, __ebx,  *[fs:0x0], 0x401316, _t37);
          				_t19 =  *0x425010; // 0x58fea8
          				_v28 = 0;
          				if(_t19 == 0) {
          					__imp____vbaNew2(0x402320, 0x425010);
          					_t19 =  *0x425010; // 0x58fea8
          				}
          				_t21 =  &_v28;
          				__imp____vbaObjSet(_t21,  *((intOrPtr*)( *_t19 + 0x338))(_t19));
          				_t26 = _t41 - 0x10;
          				_t36 = _t21;
          				 *_t26 = 0xa;
          				 *((intOrPtr*)(_t26 + 4)) = _v40;
          				 *((intOrPtr*)(_t26 + 8)) = 0x80020004;
          				 *((intOrPtr*)(_t26 + 0xc)) = _v32;
          				_t24 =  *((intOrPtr*)( *_t36 + 0x1ec))(_t36, L"Purveys6");
          				asm("fclex");
          				if(_t24 < 0) {
          					__imp____vbaHresultCheckObj(_t24, _t36, 0x403e40, 0x1ec);
          				}
          				__imp____vbaFreeObj();
          				_push(0x42395f);
          				return _t24;
          			}



















          0x00423893
          0x004238a2
          0x004238a9
          0x004238af
          0x004238b2
          0x004238bb
          0x004238be
          0x004238c4
          0x004238c7
          0x004238cc
          0x004238d1
          0x004238dd
          0x004238e3
          0x004238e3
          0x004238f2
          0x004238f6
          0x00423904
          0x00423906
          0x00423914
          0x0042391a
          0x0042391d
          0x00423923
          0x00423926
          0x0042392e
          0x00423930
          0x0042393e
          0x0042393e
          0x00423947
          0x0042394d
          0x00000000

          APIs
          • __vbaNew2.MSVBVM60(00402320,00425010,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004238DD
          • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004238F6
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E40,000001EC), ref: 0042393E
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423947
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresultNew2
          • String ID: Purveys6
          • API String ID: 1645334062-576487876
          • Opcode ID: 8614a62aca1115a33a71a623eae636c81669c007083d220cefdefc7c02144f82
          • Instruction ID: 4f1520f568ff909983864acccec5b874a2d790d21997caf876206f959b83aad9
          • Opcode Fuzzy Hash: 8614a62aca1115a33a71a623eae636c81669c007083d220cefdefc7c02144f82
          • Instruction Fuzzy Hash: 712160B0A00204AFC710EFA9DD89B9ABFF8FB49701F50816AF505E7291C6789981CB95
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00403EA0,00425B90,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423D40
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,00000014,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423D65
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403FC4,00000120,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423D8F
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423D98
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckHresult$FreeNew2
          • String ID:
          • API String ID: 4261391273-0
          • Opcode ID: 749f87a06ab6a0f6b90ffb9fc3ecdf4a0e958de9832413984fd802f61767c5fe
          • Instruction ID: 07d047bcd91c5c33a1b499e270232e175450a40d2ba6f6bbe1f1a2344208683c
          • Opcode Fuzzy Hash: 749f87a06ab6a0f6b90ffb9fc3ecdf4a0e958de9832413984fd802f61767c5fe
          • Instruction Fuzzy Hash: F8117F74A00214ABCB00DF55DD49EAEBBBDFB48705F904166F505F72A0C378A9028F98
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00403EA0,00425B90,?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00424274
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,00000014), ref: 00424299
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403FC4,00000108), ref: 004242C3
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004242CC
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckHresult$FreeNew2
          • String ID:
          • API String ID: 4261391273-0
          • Opcode ID: a37370478aee43caba30f50c44939640ea8ed9f562fa1a8e639801304bfc08a5
          • Instruction ID: b66e80788f2610edad76c8110dacee07b805b54df17f0d89964609a112477d7a
          • Opcode Fuzzy Hash: a37370478aee43caba30f50c44939640ea8ed9f562fa1a8e639801304bfc08a5
          • Instruction Fuzzy Hash: 50119370A40218EBCB00CF95DD49EDEBBB8FB58741F900165F145B35A0C7B869018BB8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00403EA0,00425B90,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004239C4
          • __vbaHresultCheckObj.MSVBVM60(00000000,0052E9A4,00403E90,00000014,?,?,?,?,?,?,?,?,?,?,00401316), ref: 004239E9
          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403FC4,00000120,?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423A13
          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401316), ref: 00423A1C
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckHresult$FreeNew2
          • String ID:
          • API String ID: 4261391273-0
          • Opcode ID: 150dc48f10eb7e1e1b31e7a000735d965862b11b7f6a8b3e4444f546837701ed
          • Instruction ID: 97400ed208f30b3d6825ab8480b8d5b38b088bb6922a0dc26df15b8083d9f1de
          • Opcode Fuzzy Hash: 150dc48f10eb7e1e1b31e7a000735d965862b11b7f6a8b3e4444f546837701ed
          • Instruction Fuzzy Hash: 86119170A40205ABC700DF95DD4AEAEBFB8FB58702F900126F145F31E0D2B869418B98
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004231F3
          • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 0042320C
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,000001AC), ref: 0042322F
          • __vbaFreeObj.MSVBVM60 ref: 00423238
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresultNew2
          • String ID:
          • API String ID: 1645334062-0
          • Opcode ID: 70439abc5d945d7951a6b6b5f3db60e8fdc08d05f352f6652a3f7b635021e61a
          • Instruction ID: 7c2dd1253dbcdafcbcf7b8cc7cdd2cbd873103e53d7f64f71cf583cb273f332f
          • Opcode Fuzzy Hash: 70439abc5d945d7951a6b6b5f3db60e8fdc08d05f352f6652a3f7b635021e61a
          • Instruction Fuzzy Hash: 3101E174A00305EFD710AFA5DE49FAA7BB8EB05B01F504075F841F32A0D77C5A058BA9
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • __vbaNew2.MSVBVM60(00402320,00425010), ref: 004241B3
          • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 004241CC
          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403E60,000001AC), ref: 004241EF
          • __vbaFreeObj.MSVBVM60 ref: 004241F8
          Memory Dump Source
          • Source File: 00000000.00000002.669321060.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.669315754.0000000000400000.00000002.00020000.sdmp Download File
          • Associated: 00000000.00000002.669341790.0000000000425000.00000004.00020000.sdmp Download File
          • Associated: 00000000.00000002.669348751.0000000000427000.00000002.00020000.sdmp Download File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_41609787.jbxd
          Similarity
          • API ID: __vba$CheckFreeHresultNew2
          • String ID:
          • API String ID: 1645334062-0
          • Opcode ID: 5c16103a50f5b6db2818cd5bc6ee81280f9b3cedcb20bab0fbf6c84b5ac17c20
          • Instruction ID: 080ae976fd8b1a3a9a2555df3ae57fd3ef4fc92c588c944d03fb37bf23ab377e
          • Opcode Fuzzy Hash: 5c16103a50f5b6db2818cd5bc6ee81280f9b3cedcb20bab0fbf6c84b5ac17c20
          • Instruction Fuzzy Hash: B601CC74640214ABD710AFA8DE0DFAA7BB8FB05B00F904465F841F32A0D2B858048BAA
          Uniqueness

          Uniqueness Score: -1.00%

          Execution Graph

          Execution Coverage:10.9%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:0%
          Total number of Nodes:72
          Total number of Limit Nodes:4

          Graph

          execution_graph 857 30115e3 860 30114ec 857->860 858 301164b NtProtectVirtualMemory 864 3011667 858->864 859 30115db Sleep 859->860 860->859 861 3011552 860->861 862 30115be 860->862 862->858 862->861 863 3011884 864->863 865 301181b NtProtectVirtualMemory 864->865 866 3011827 865->866 892 3011687 895 301163c 892->895 893 3011661 NtProtectVirtualMemory 894 3011667 893->894 896 3011884 894->896 897 301181b NtProtectVirtualMemory 894->897 895->893 895->894 898 3011827 897->898 899 3011568 903 30114ec 899->903 900 30115db Sleep 900->903 901 301164b NtProtectVirtualMemory 906 3011667 901->906 902 3011552 903->900 903->902 904 30115be 903->904 904->901 904->902 905 3011884 906->905 907 301181b NtProtectVirtualMemory 906->907 908 3011827 907->908 909 301136d 911 301131c 909->911 912 3011370 909->912 910 301143b TerminateThread 910->911 912->910 912->911 913 30116cc 915 301170a 913->915 914 3011884 915->914 916 301181b NtProtectVirtualMemory 915->916 917 3011827 916->917 871 301174e 872 3011660 871->872 873 3011661 NtProtectVirtualMemory 872->873 875 3011667 872->875 873->875 874 3011884 875->874 876 301181b NtProtectVirtualMemory 875->876 877 3011827 876->877 878 301146e 879 30113d8 878->879 880 3011443 879->880 881 301143b TerminateThread 879->881 881->880 867 30117d3 869 301178c 867->869 868 301181b NtProtectVirtualMemory 870 3011827 868->870 869->868 869->870 928 30116d3 931 301163c 928->931 934 3011667 928->934 929 3011661 NtProtectVirtualMemory 929->934 930 3011884 931->929 931->934 932 301181b NtProtectVirtualMemory 933 3011827 932->933 934->930 934->932 935 30113ff 938 30113b4 935->938 936 301143b TerminateThread 937 3011341 936->937 938->936 938->937 939 301153f 942 30114ec 939->942 940 30115db Sleep 940->942 941 301164b NtProtectVirtualMemory 946 3011667 941->946 942->939 942->940 943 30115be 942->943 944 3011552 942->944 943->941 943->944 945 3011884 946->945 947 301181b NtProtectVirtualMemory 946->947 948 3011827 947->948

          Callgraph

          Executed Functions

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 3011687-301168b 1 301168c 0->1 2 301163c-3011645 1->2 3 301168e 1->3 4 3011648-301164a 2->4 3->2 5 3011690-3011694 3->5 6 3011661-3011665 NtProtectVirtualMemory 4->6 7 301164c-301164f 4->7 8 3011696-3011697 5->8 9 30116bf-30116c5 5->9 11 3011667-301167a call 30114d9 6->11 12 3011666 call 30114d9 6->12 10 3011654-301165d 7->10 13 3011698 8->13 16 30116cb-30116d0 9->16 14 3011660 10->14 21 30116b8-30116ba 11->21 12->11 13->4 17 301169a 13->17 14->6 23 301170a-301170c 16->23 17->4 18 301169c-30116a0 17->18 18->16 20 30116a2-30116a3 18->20 24 30116a4 20->24 21->9 29 301170f-3011716 23->29 24->10 26 30116a6 24->26 26->10 28 30116a8-30116ac 26->28 31 30116d7-30116dc 28->31 32 30116ae-30116af 28->32 30 301171b-301171c 29->30 33 3011884-30118a1 30->33 34 301171e-3011725 30->34 31->1 35 30116de 31->35 36 30116b0 32->36 34->33 37 3011727-301172f call 301144d 34->37 35->1 38 30116e0-30116e4 35->38 36->14 39 30116b2 36->39 43 3011733-3011746 call 30114d9 37->43 38->29 41 30116e6-30116e8 38->41 39->14 42 30116b4-30116b5 39->42 41->13 44 30116ea 41->44 42->21 43->33 49 301174c-301178c 43->49 44->13 46 30116ec-30116f0 44->46 46->30 48 30116f2-30116f4 46->48 48->24 50 30116f6 48->50 49->33 55 3011792-3011881 NtProtectVirtualMemory 49->55 50->24 52 30116f8-30116fc 50->52 52->37 54 30116fe-3011700 52->54 54->36 58 3011702 54->58 58->36 60 3011704-3011708 58->60 60->23 60->43
          APIs
          • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 03011664
          • NtProtectVirtualMemory.NTDLL(000000FF,-00000024,-00000020,?,?,?,?,?,00000040,00000000,?), ref: 0301181E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID:
          • API String ID: 2706961497-0
          • Opcode ID: d176e24c00479f0ae410771109bb7d176228d8f3bfe4516d044b3cf1f90c811b
          • Instruction ID: a22f1f700d74663537210ed38808da8716785a8b67925b3866bb0355e06aeead
          • Opcode Fuzzy Hash: d176e24c00479f0ae410771109bb7d176228d8f3bfe4516d044b3cf1f90c811b
          • Instruction Fuzzy Hash: C15155B3A16B419FE75CDF78C849799BBF5FF9562074D038AD6918F0A1C36584A0CB02
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 64 3011587-301158c 65 30115b7-30115b9 64->65 66 301158e-3011590 64->66 67 30115bc 65->67 68 3011540-3011544 66->68 69 3011592 66->69 72 30115e7-30115e8 67->72 73 30115be-30115c0 67->73 70 3011546-3011548 68->70 71 301156f-301157b call 30114d9 68->71 69->68 74 3011594-3011595 69->74 75 30114f8-3011508 70->75 76 301154a 70->76 90 30115c9-30115cc 71->90 91 301157d-30115c1 71->91 78 3011598 72->78 79 30115ea 72->79 80 30115c2 73->80 81 3011628-301162c 73->81 74->78 89 301153d-301153e 75->89 76->75 82 301154c-3011550 76->82 86 30115c3 78->86 87 301159a-301159c 78->87 79->78 84 30115ec-30115f0 79->84 80->86 85 3011633-301163a 81->85 88 3011552-3011557 82->88 82->89 92 30115f2-30115f4 84->92 93 301161b-3011620 84->93 94 301163f-3011645 85->94 106 30115c7 86->106 87->82 95 301159e 87->95 100 3011558-3011563 88->100 104 30114ec-30114f7 89->104 105 301153f 89->105 97 30115cf-30115d7 90->97 91->106 102 30115a4 92->102 103 30115f6 92->103 98 3011622 93->98 99 301164b-301171c NtProtectVirtualMemory call 30114d9 * 2 93->99 94->99 95->82 96 30115a0-30115a1 95->96 96->102 107 30115e0-30115e1 97->107 108 30115d9 97->108 110 3011623 98->110 143 3011884-30118a1 99->143 144 301171e-3011725 99->144 118 3011564-3011567 100->118 102->97 109 30115a6-30115a8 102->109 103->102 112 30115f8-30115fc 103->112 104->75 105->68 114 30115c8 106->114 107->110 115 30115db Sleep 108->115 109->100 116 30115aa 109->116 117 3011627 110->117 112->117 119 30115fe-3011600 112->119 115->72 116->100 121 30115ac-30115ad 116->121 117->81 122 30115b0 119->122 123 3011602 119->123 121->122 122->115 125 30115b2-30115b4 122->125 123->122 126 3011604-3011608 123->126 125->118 128 30115b6 125->128 126->85 129 301160a-301160c 126->129 128->65 128->118 129->67 131 301160e 129->131 131->67 132 3011610-3011614 131->132 132->94 134 3011616-3011618 132->134 134->114 135 301161a 134->135 135->93 135->114 144->143 145 3011727-3011746 call 301144d call 30114d9 144->145 145->143 150 301174c-301178c 145->150 150->143 153 3011792-3011881 NtProtectVirtualMemory 150->153
          APIs
          • Sleep.KERNELBASE(?), ref: 030115DB
          • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 03011664
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectSleepVirtual
          • String ID:
          • API String ID: 3235210055-0
          • Opcode ID: dc8259ee87906b1d5abf9db04b250f60578e79a50b81d946c8412d22acb8fa1f
          • Instruction ID: 95b5d7116164604e7fbee4fdecc3c1c6f28676d817ddf49f572d8181a4cd9d54
          • Opcode Fuzzy Hash: dc8259ee87906b1d5abf9db04b250f60578e79a50b81d946c8412d22acb8fa1f
          • Instruction Fuzzy Hash: AC41D2F3A06A42DFE36DEE39D808398B7F6FFD064179D0249D3570F219D22185A48A41
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 159 301156f-301157b call 30114d9 162 30115c9-30115cc 159->162 163 301157d-30115c1 159->163 164 30115cf-30115d7 162->164 168 30115c7 163->168 166 30115e0-30115e1 164->166 167 30115d9 164->167 170 3011623 166->170 169 30115db Sleep 167->169 171 30115c8 168->171 173 30115e7-30115e8 169->173 172 3011627 170->172 174 3011628-301162c 172->174 175 3011598 173->175 176 30115ea 173->176 177 3011633-301163a 174->177 180 30115c3 175->180 181 301159a-301159c 175->181 176->175 178 30115ec-30115f0 176->178 179 301163f-3011645 177->179 182 30115f2-30115f4 178->182 183 301161b-3011620 178->183 184 301164b-301171c NtProtectVirtualMemory call 30114d9 * 2 179->184 180->168 185 301154c-3011550 181->185 186 301159e 181->186 191 30115a4 182->191 192 30115f6 182->192 183->184 188 3011622 183->188 234 3011884-30118a1 184->234 235 301171e-3011725 184->235 189 3011552-3011557 185->189 190 301153d-301153e 185->190 186->185 187 30115a0-30115a1 186->187 187->191 188->170 195 3011558-3011563 189->195 196 30114ec-30114f7 190->196 197 301153f-3011544 190->197 191->164 194 30115a6-30115a8 191->194 192->191 198 30115f8-30115fc 192->198 194->195 200 30115aa 194->200 208 3011564-3011567 195->208 202 30114f8-3011508 196->202 197->159 206 3011546-3011548 197->206 198->172 204 30115fe-3011600 198->204 200->195 207 30115ac-30115ad 200->207 202->190 209 30115b0 204->209 210 3011602 204->210 206->202 212 301154a 206->212 207->209 209->169 213 30115b2-30115b4 209->213 210->209 214 3011604-3011608 210->214 212->185 212->202 213->208 216 30115b6 213->216 214->177 217 301160a-301160c 214->217 216->208 219 30115b7-30115b9 216->219 220 30115bc 217->220 221 301160e 217->221 219->220 220->173 223 30115be-30115c0 220->223 221->220 222 3011610-3011614 221->222 222->179 224 3011616-3011618 222->224 223->174 226 30115c2 223->226 224->171 227 301161a 224->227 226->180 227->171 227->183 235->234 236 3011727-3011746 call 301144d call 30114d9 235->236 236->234 241 301174c-301178c 236->241 241->234 244 3011792-3011881 NtProtectVirtualMemory 241->244
          APIs
          • Sleep.KERNELBASE(?), ref: 030115DB
          • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 03011664
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectSleepVirtual
          • String ID:
          • API String ID: 3235210055-0
          • Opcode ID: 8efef7bbe1ecbf25b61b7faabfeeb50db1d2d708cfb10daf0c9126206c12d2dd
          • Instruction ID: cdcdc3bd249f0d83ab72331caeceae5cb2698da733653789449d5c663ec65ec4
          • Opcode Fuzzy Hash: 8efef7bbe1ecbf25b61b7faabfeeb50db1d2d708cfb10daf0c9126206c12d2dd
          • Instruction Fuzzy Hash: A701DEB1542301DFE70CDF31C81CB99B3B8AF143A1F898184EA424B1AAC3748980CF52
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 250 301136d-301136e 251 3011370-3011374 250->251 252 301131c-301133e 250->252 254 3011376-301138c 251->254 255 301139f-30113a4 251->255 256 3011340-301134b 252->256 281 30113b7-30113bd 254->281 282 301138e-3011390 254->282 257 30113a6-30113a8 255->257 258 30113cf-30113d7 255->258 267 301134c-301136b 256->267 261 3011410 257->261 262 30113a9-30113b0 257->262 264 30113d8-30113e2 258->264 265 30113c0 261->265 266 3011412 261->266 269 30113e4-30113fd 264->269 272 30113c3-30113c6 265->272 266->265 271 3011414-3011418 266->271 267->262 270 301143b-3011442 TerminateThread 269->270 274 3011443-3011448 270->274 271->274 275 301141a-301141c 271->275 277 30113cc-30113cd 272->277 285 301144f-3011453 274->285 275->277 279 301141e 275->279 277->258 279->277 284 3011420-3011424 279->284 281->265 282->256 283 3011392 282->283 283->256 286 3011394-3011398 283->286 284->285 287 3011426-3011428 284->287 288 3011454-301145a 285->288 286->272 289 301139a-301139c 286->289 287->264 290 301142a 287->290 291 301145c-30114ce 288->291 289->267 292 301139e 289->292 290->264 293 301142c-3011430 290->293 291->288 299 30114d0-30114d2 291->299 292->255 292->267 295 3011432-3011434 293->295 296 301145b 293->296 295->269 298 3011436 295->298 296->291 298->269 300 3011438-3011439 298->300 300->270
          APIs
          • TerminateThread.KERNELBASE ref: 0301143E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: TerminateThread
          • String ID:
          • API String ID: 1852365436-0
          • Opcode ID: e895506eee786188b9256c185d11bca2bd0bb4bdccb389c573337d1ded20e1b6
          • Instruction ID: 7dff3084280b3525374df51f40f418992bdca6332022e93391ad15d4f08458e4
          • Opcode Fuzzy Hash: e895506eee786188b9256c185d11bca2bd0bb4bdccb389c573337d1ded20e1b6
          • Instruction Fuzzy Hash: 48514476A067819BE36EEF34C884399B7F2FF85650F8C064ACB911B869D32100A4870B
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 301 301174e-3011750 302 3011700 301->302 303 3011752 301->303 304 30116b0 302->304 305 3011702 302->305 303->302 306 3011754-3011758 303->306 307 3011660-3011665 NtProtectVirtualMemory 304->307 308 30116b2 304->308 305->304 309 3011704-3011708 305->309 310 3011783-3011785 306->310 311 301175a-301175c 306->311 320 3011667-301167a call 30114d9 307->320 321 3011666 call 30114d9 307->321 308->307 313 30116b4-30116b5 308->313 315 3011733-3011746 call 30114d9 309->315 316 301170a 309->316 314 3011786-301178c 310->314 317 301170c-301171c 311->317 318 301175e 311->318 322 30116b8-30116d0 313->322 328 3011792-30117cd 314->328 329 3011884-30118a1 314->329 315->329 336 301174c 315->336 316->317 317->329 335 301171e-3011725 317->335 318->317 324 3011760-3011764 318->324 320->322 321->320 322->316 331 3011766-3011770 324->331 332 301178f-301179a 324->332 337 30117d0-3011825 NtProtectVirtualMemory 328->337 338 301179b-30117a6 331->338 344 3011772-3011774 331->344 332->338 335->329 341 3011727-301172f call 301144d 335->341 336->314 351 3011827-3011881 337->351 343 30117a7-30117ae 338->343 341->315 343->337 348 30117b0-30117cd 343->348 349 3011724-3011725 344->349 350 3011776 344->350 348->337 349->329 352 3011726-301172f call 301144d 349->352 350->349 353 3011778-301177c 350->353 358 3011730-301173b 352->358 353->343 357 301177e-3011780 353->357 357->358 359 3011782 357->359 361 3011743-3011746 358->361 362 301173e call 30114d9 358->362 359->310 359->358 361->329 361->336 362->361
          APIs
          • NtProtectVirtualMemory.NTDLL(000000FF,-00000024,-00000020,?,?,?,?,?,00000040,00000000,?), ref: 0301181E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID:
          • API String ID: 2706961497-0
          • Opcode ID: f1eaf74cc69ba75cd11ec51cfa4dd9efe8a0aa6fc9d905ab8b66d6b38c2e7cec
          • Instruction ID: 8f0dcb90246aac35ef7605af3019d3331d9a269b2449dc3cfd091b61679d7ffe
          • Opcode Fuzzy Hash: f1eaf74cc69ba75cd11ec51cfa4dd9efe8a0aa6fc9d905ab8b66d6b38c2e7cec
          • Instruction Fuzzy Hash: 5A318BB750A7416FE35DDF38D844B867BF1FF86250B5D438ADA818F2A2D32484A58702
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 363 30116d3-30116d8 364 3011703-3011708 363->364 365 30116da-30116dc 363->365 368 3011733-3011746 call 30114d9 364->368 369 301170a-301170c 364->369 366 301168c 365->366 367 30116de 365->367 372 301163c-3011645 366->372 373 301168e 366->373 367->366 370 30116e0-30116e4 367->370 385 3011884-30118a1 368->385 386 301174c-301178c 368->386 377 301170f-3011716 369->377 376 30116e6-30116e8 370->376 370->377 375 3011648-301164a 372->375 373->372 379 3011690-3011694 373->379 381 3011661-3011665 NtProtectVirtualMemory 375->381 382 301164c-301164f 375->382 383 3011698 376->383 384 30116ea 376->384 380 301171b-301171c 377->380 387 3011696-3011697 379->387 388 30116bf-30116c5 379->388 380->385 389 301171e-3011725 380->389 392 3011667-301167a call 30114d9 381->392 393 3011666 call 30114d9 381->393 390 3011654-301165d 382->390 383->375 395 301169a 383->395 384->383 391 30116ec-30116f0 384->391 386->385 407 3011792-3011881 NtProtectVirtualMemory 386->407 387->383 402 30116cb-30116d0 388->402 389->385 397 3011727-301172f call 301144d 389->397 398 3011660 390->398 391->380 399 30116f2-30116f4 391->399 412 30116b8-30116ba 392->412 393->392 395->375 396 301169c-30116a0 395->396 396->402 403 30116a2-30116a3 396->403 397->368 398->381 405 30116a4 399->405 406 30116f6 399->406 402->369 403->405 405->390 409 30116a6 405->409 406->405 410 30116f8-30116fc 406->410 409->390 414 30116a8-30116ac 409->414 410->397 415 30116fe-3011700 410->415 412->388 418 30116d7-30116dc 414->418 419 30116ae-30116af 414->419 422 30116b0 415->422 423 3011702 415->423 418->366 418->367 419->422 422->398 425 30116b2 422->425 423->422 426 3011704-3011708 423->426 425->398 428 30116b4-30116b5 425->428 426->368 426->369 428->412
          APIs
          • NtProtectVirtualMemory.NTDLL(000000FF,-00000024,-00000020,?,?,?,?,?,00000040,00000000,?), ref: 0301181E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID:
          • API String ID: 2706961497-0
          • Opcode ID: 9c9c0441f46aad4d250f45e37ea3a056cf422b61ddd55330e441d46fc7dd284a
          • Instruction ID: a47b46fb30ccb833fb24cf70ea2c4f67186c2eda184926754984726304cebd98
          • Opcode Fuzzy Hash: 9c9c0441f46aad4d250f45e37ea3a056cf422b61ddd55330e441d46fc7dd284a
          • Instruction Fuzzy Hash: 33218BB3602700AFE75CDE78C844B9A3BF5FF95610B5D439ADB418F2A1D335C0A08611
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 429 30117d3-30117d8 430 3011803-301180e 429->430 431 30117da-30117dc 429->431 440 301180f-3011811 430->440 433 301178c 431->433 434 30117de 431->434 436 3011792-30117cd 433->436 437 3011884-30118a1 433->437 434->433 438 30117e0-30117e4 434->438 441 30117d0-30117d1 436->441 439 30117e6-30117f0 438->439 438->440 445 301181b-3011825 NtProtectVirtualMemory 439->445 446 30117f2-30117fc 439->446 443 3011813-3011818 440->443 441->443 443->445 447 3011827-3011881 445->447 446->447 451 30117fe-3011800 446->451 452 30117b0-30117cd 451->452 453 3011802 451->453 452->441 453->430 453->452
          APIs
          • NtProtectVirtualMemory.NTDLL(000000FF,-00000024,-00000020,?,?,?,?,?,00000040,00000000,?), ref: 0301181E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID:
          • API String ID: 2706961497-0
          • Opcode ID: c1ca16e5f839e82735d3526c65abbd58dec15ebc02de65eaeb207facd183797a
          • Instruction ID: ca50928a51341cacae9060326532b3d260aadb8037a2e9141445418083ff741f
          • Opcode Fuzzy Hash: c1ca16e5f839e82735d3526c65abbd58dec15ebc02de65eaeb207facd183797a
          • Instruction Fuzzy Hash: 102176F390AA40AFE35CDE38C8097963BF2FFD55A131C839AE6424F261D37880658605
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 454 30116cc-301171c 459 3011884-30118a1 454->459 460 301171e-3011725 454->460 460->459 461 3011727-3011746 call 301144d call 30114d9 460->461 461->459 466 301174c-301178c 461->466 466->459 469 3011792-3011881 NtProtectVirtualMemory 466->469
          APIs
          • NtProtectVirtualMemory.NTDLL(000000FF,-00000024,-00000020,?,?,?,?,?,00000040,00000000,?), ref: 0301181E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectVirtual
          • String ID:
          • API String ID: 2706961497-0
          • Opcode ID: e5b0aa4ce46de44dbcb0b47789bff05cd5cad098c35907ac62ff17a21eb8969f
          • Instruction ID: 681303d66b95d53c47273e17c8c5886d24447530cfda8b22a1d5acb953cb0363
          • Opcode Fuzzy Hash: e5b0aa4ce46de44dbcb0b47789bff05cd5cad098c35907ac62ff17a21eb8969f
          • Instruction Fuzzy Hash: C6212B72105301AFEB1CCEA8C641BDB3B95AF162A4F5543A9DE82CB1A1D3B4D4818611
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 515 30115e3-30115e6 516 30115e7-30115e8 515->516 517 3011598 516->517 518 30115ea 516->518 520 30115c3 517->520 521 301159a-301159c 517->521 518->517 519 30115ec-30115f0 518->519 522 30115f2-30115f4 519->522 523 301161b-3011620 519->523 533 30115c7 520->533 524 301154c-3011550 521->524 525 301159e 521->525 531 30115a4 522->531 532 30115f6 522->532 527 3011622 523->527 528 301164b-301171c NtProtectVirtualMemory call 30114d9 * 2 523->528 529 3011552-3011557 524->529 530 301153d-301153e 524->530 525->524 526 30115a0-30115a1 525->526 526->531 536 3011623 527->536 591 3011884-30118a1 528->591 592 301171e-3011725 528->592 537 3011558-3011563 529->537 538 30114ec-30114f7 530->538 539 301153f-3011544 530->539 534 30115a6-30115a8 531->534 535 30115cf-30115d7 531->535 532->531 540 30115f8-30115fc 532->540 542 30115c8 533->542 534->537 545 30115aa 534->545 543 30115e0-30115e1 535->543 544 30115d9 535->544 546 3011627 536->546 557 3011564-3011567 537->557 548 30114f8-3011508 538->548 552 3011546-3011548 539->552 553 301156f-301157b call 30114d9 539->553 540->546 550 30115fe-3011600 540->550 543->536 554 30115db Sleep 544->554 545->537 555 30115ac-30115ad 545->555 556 3011628-301162c 546->556 548->530 558 30115b0 550->558 559 3011602 550->559 552->548 561 301154a 552->561 572 30115c9-30115cc 553->572 573 301157d-30115c1 553->573 554->516 555->558 564 3011633-301163a 556->564 558->554 563 30115b2-30115b4 558->563 559->558 565 3011604-3011608 559->565 561->524 561->548 563->557 568 30115b6 563->568 569 301163f-3011645 564->569 565->564 570 301160a-301160c 565->570 568->557 574 30115b7-30115b9 568->574 569->528 575 30115bc 570->575 576 301160e 570->576 572->535 573->533 574->575 575->516 580 30115be-30115c0 575->580 576->575 577 3011610-3011614 576->577 577->569 581 3011616-3011618 577->581 580->556 582 30115c2 580->582 581->542 583 301161a 581->583 582->520 583->523 583->542 592->591 593 3011727-3011746 call 301144d call 30114d9 592->593 593->591 598 301174c-301178c 593->598 598->591 601 3011792-3011825 NtProtectVirtualMemory 598->601 605 3011827-3011881 601->605
          APIs
          • Sleep.KERNELBASE(?), ref: 030115DB
          • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 03011664
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectSleepVirtual
          • String ID:
          • API String ID: 3235210055-0
          • Opcode ID: 4b7b87de816732bcc69d89c708d754173b2049621880ffd5199f75682e5fc659
          • Instruction ID: d1c38f90d05ba2f2ac2af7c5e28d08cf1bda51c56dca8297be6a8fb63075bc49
          • Opcode Fuzzy Hash: 4b7b87de816732bcc69d89c708d754173b2049621880ffd5199f75682e5fc659
          • Instruction Fuzzy Hash: 7C11CAF3912A41DEE36CDA39C80C398B7F6FFA4661B8D0249D2521F168C22545A08A46
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 475 30113ff-3011404 476 30113b4 475->476 477 3011406 475->477 479 3011341-30113b0 476->479 480 30113b6-30113bd 476->480 477->476 478 3011408-301140c 477->478 481 3011437 478->481 482 301140e-3011410 478->482 487 30113c0-30113c6 480->487 486 3011438-3011439 481->486 482->487 488 3011412 482->488 491 301143b-3011442 TerminateThread 486->491 494 30113cc-30113d7 487->494 488->487 492 3011414-3011418 488->492 495 3011443-3011448 491->495 492->495 496 301141a-301141c 492->496 500 30113d8-30113e2 494->500 501 301144f-3011453 495->501 496->494 499 301141e 496->499 499->494 502 3011420-3011424 499->502 504 30113e4-30113fd 500->504 503 3011454-301145a 501->503 502->501 505 3011426-3011428 502->505 506 301145c-30114ce 503->506 504->491 505->500 507 301142a 505->507 506->503 513 30114d0-30114d2 506->513 507->500 509 301142c-3011430 507->509 511 3011432-3011434 509->511 512 301145b 509->512 511->504 514 3011436 511->514 512->506 514->486 514->504
          APIs
          • TerminateThread.KERNELBASE ref: 0301143E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: TerminateThread
          • String ID:
          • API String ID: 1852365436-0
          • Opcode ID: a53f130c2b195e7a7e76aea24650f495224a338833fd8b79d252386b9a248288
          • Instruction ID: 98c937895a19b1b2b9266c91c1b9fa87e7c48b80541620f3b2e0f10b4732be48
          • Opcode Fuzzy Hash: a53f130c2b195e7a7e76aea24650f495224a338833fd8b79d252386b9a248288
          • Instruction Fuzzy Hash: 9A11CAB7606B429BE35DEE38C845358B7F6FF91A51F8D074AC7E11B854D21114A8860A
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 607 3011338-30113b0
          APIs
          • TerminateThread.KERNELBASE ref: 0301143E
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: TerminateThread
          • String ID:
          • API String ID: 1852365436-0
          • Opcode ID: 6779e2c1c8c0cbfb1cc6c94743f0aced8d270f6c61db8f949a54ebabbe53a0a9
          • Instruction ID: 5774afbf04374d288a348c6206b844c3a30dfd0d64785bcffbc2bc40ab9d37c7
          • Opcode Fuzzy Hash: 6779e2c1c8c0cbfb1cc6c94743f0aced8d270f6c61db8f949a54ebabbe53a0a9
          • Instruction Fuzzy Hash: 6A018F792453529BDB28AE308A917EA73F5BF227A0F42461DCDD59B498E33A40858606
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 613 301153f-3011544 615 3011546-3011548 613->615 616 301156f-301157b call 30114d9 613->616 617 30114f8-3011508 615->617 618 301154a 615->618 624 30115c9-30115cc 616->624 625 301157d-30115c1 616->625 623 301153d-301153e 617->623 618->617 620 301154c-3011550 618->620 622 3011552-3011557 620->622 620->623 627 3011558-3011563 622->627 623->613 629 30114ec-30114f7 623->629 626 30115cf-30115d7 624->626 633 30115c7 625->633 630 30115e0-30115e1 626->630 631 30115d9 626->631 635 3011564-3011567 627->635 629->617 636 3011623 630->636 634 30115db Sleep 631->634 637 30115c8 633->637 639 30115e7-30115e8 634->639 638 3011627 636->638 640 3011628-301162c 638->640 641 3011598 639->641 642 30115ea 639->642 643 3011633-301163a 640->643 646 30115c3 641->646 647 301159a-301159c 641->647 642->641 644 30115ec-30115f0 642->644 645 301163f-3011645 643->645 648 30115f2-30115f4 644->648 649 301161b-3011620 644->649 650 301164b-301171c NtProtectVirtualMemory call 30114d9 * 2 645->650 646->633 647->620 651 301159e 647->651 654 30115a4 648->654 655 30115f6 648->655 649->650 653 3011622 649->653 688 3011884-30118a1 650->688 689 301171e-3011725 650->689 651->620 652 30115a0-30115a1 651->652 652->654 653->636 654->626 657 30115a6-30115a8 654->657 655->654 658 30115f8-30115fc 655->658 657->627 660 30115aa 657->660 658->638 661 30115fe-3011600 658->661 660->627 663 30115ac-30115ad 660->663 664 30115b0 661->664 665 3011602 661->665 663->664 664->634 667 30115b2-30115b4 664->667 665->664 668 3011604-3011608 665->668 667->635 670 30115b6 667->670 668->643 671 301160a-301160c 668->671 670->635 673 30115b7-30115b9 670->673 674 30115bc 671->674 675 301160e 671->675 673->674 674->639 677 30115be-30115c0 674->677 675->674 676 3011610-3011614 675->676 676->645 678 3011616-3011618 676->678 677->640 680 30115c2 677->680 678->637 681 301161a 678->681 680->646 681->637 681->649 689->688 690 3011727-3011746 call 301144d call 30114d9 689->690 690->688 695 301174c-301178c 690->695 695->688 698 3011792-3011881 NtProtectVirtualMemory 695->698
          APIs
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: Sleep
          • String ID:
          • API String ID: 3472027048-0
          • Opcode ID: 97a713e2a69f0278429f1e9583296ed98f3fca9896a1153da43e2fe5884bda19
          • Instruction ID: 48802caa2c3d9985d4d19760bc129f121028aaccad03b15860f79732536c4a4c
          • Opcode Fuzzy Hash: 97a713e2a69f0278429f1e9583296ed98f3fca9896a1153da43e2fe5884bda19
          • Instruction Fuzzy Hash: DC11A73060F7828FD31EDB344854754BBB1FF422A0B8D42C6C1A54F1E7D7148459C792
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 704 3011568 705 301156f-301157b call 30114d9 704->705 708 30115c9-30115cc 705->708 709 301157d-30115c1 705->709 710 30115cf-30115d7 708->710 714 30115c7 709->714 712 30115e0-30115e1 710->712 713 30115d9 710->713 716 3011623 712->716 715 30115db Sleep 713->715 717 30115c8 714->717 719 30115e7-30115e8 715->719 718 3011627 716->718 720 3011628-301162c 718->720 721 3011598 719->721 722 30115ea 719->722 723 3011633-301163a 720->723 726 30115c3 721->726 727 301159a-301159c 721->727 722->721 724 30115ec-30115f0 722->724 725 301163f-3011645 723->725 728 30115f2-30115f4 724->728 729 301161b-3011620 724->729 730 301164b-301171c NtProtectVirtualMemory call 30114d9 * 2 725->730 726->714 731 301154c-3011550 727->731 732 301159e 727->732 737 30115a4 728->737 738 30115f6 728->738 729->730 734 3011622 729->734 780 3011884-30118a1 730->780 781 301171e-3011725 730->781 735 3011552-3011557 731->735 736 301153d-301153e 731->736 732->731 733 30115a0-30115a1 732->733 733->737 734->716 741 3011558-3011563 735->741 742 30114ec-30114f7 736->742 743 301153f-3011544 736->743 737->710 740 30115a6-30115a8 737->740 738->737 744 30115f8-30115fc 738->744 740->741 746 30115aa 740->746 754 3011564-3011567 741->754 748 30114f8-3011508 742->748 743->705 752 3011546-3011548 743->752 744->718 750 30115fe-3011600 744->750 746->741 753 30115ac-30115ad 746->753 748->736 755 30115b0 750->755 756 3011602 750->756 752->748 758 301154a 752->758 753->755 755->715 759 30115b2-30115b4 755->759 756->755 760 3011604-3011608 756->760 758->731 758->748 759->754 762 30115b6 759->762 760->723 763 301160a-301160c 760->763 762->754 765 30115b7-30115b9 762->765 766 30115bc 763->766 767 301160e 763->767 765->766 766->719 769 30115be-30115c0 766->769 767->766 768 3011610-3011614 767->768 768->725 770 3011616-3011618 768->770 769->720 772 30115c2 769->772 770->717 773 301161a 770->773 772->726 773->717 773->729 781->780 782 3011727-3011746 call 301144d call 30114d9 781->782 782->780 787 301174c-301178c 782->787 787->780 790 3011792-3011881 NtProtectVirtualMemory 787->790
          APIs
          • Sleep.KERNELBASE(?), ref: 030115DB
          • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 03011664
          Memory Dump Source
          • Source File: 0000001B.00000002.725610981.0000000003011000.00000040.00000001.sdmp, Offset: 03011000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_27_2_3011000_ieinstal.jbxd
          Similarity
          • API ID: MemoryProtectSleepVirtual
          • String ID:
          • API String ID: 3235210055-0
          • Opcode ID: b3eaa81e3ead142a646c7cd0b6d9a3d472c2e7aa81124fc6de45d937371612ef
          • Instruction ID: 872b299c0182dc81af0ec2342f6cb9b34cd5fc1479377acc9246e66ecae5a026
          • Opcode Fuzzy Hash: b3eaa81e3ead142a646c7cd0b6d9a3d472c2e7aa81124fc6de45d937371612ef
          • Instruction Fuzzy Hash: 19E04674646300DFE70CEF7184A8B8473BAAF003A0F4A80C8DA470F2A69320C890CA50
          Uniqueness

          Uniqueness Score: -1.00%

          Non-executed Functions