Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DCwTjs2dTP.exe

Overview

General Information

Sample Name:DCwTjs2dTP.exe
Analysis ID:679101
MD5:2ed2a1d6604afeaa681f4c66dcd84194
SHA1:6134d837220afe9377cd78950c8aca43dde08d8c
SHA256:2a48fa5118bf1c97de6a6b7b0a45bcc95bd678d54f31e2f2d003e5f3ea49c780
Tags:DCRatexeRAT
Infos:

Detection

AsyncRAT, DcRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected DcRat
Yara detected AsyncRAT
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Machine Learning detection for sample
Yara detected Generic Downloader
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Stores large binary data to the registry
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • DCwTjs2dTP.exe (PID: 5664 cmdline: "C:\Users\user\Desktop\DCwTjs2dTP.exe" MD5: 2ED2A1D6604AFEAA681F4C66DCD84194)
    • cmd.exe (PID: 2612 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5128 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 6128 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat"" MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 5344 cmdline: timeout 3 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
      • sihost.exe (PID: 5352 cmdline: "C:\Users\user\AppData\Roaming\sihost.exe" MD5: 2ED2A1D6604AFEAA681F4C66DCD84194)
  • cleanup
{"Server": "techandro.giize.com,hsolic.duckdns.org", "Ports": "6906,6907", "Version": " 1.0.7", "Autorun": "true", "Install_Folder": "%AppData%", "Install_File": "sihost.exe", "AES_key": "w28XgttPSPRfTrqDPtKQKIftMUNaIi1O", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "MIICKzCCAZSgAwIBAgIVANmCJqwMXdgA6yyfZkFj0aZTsu+7MA0GCSqGSIb3DQEBDQUAMF8xEDAOBgNVBAMMB2Rldk5vZGUxEzARBgNVBAsMCnF3cWRhbmNodW4xHDAaBgNVBAoME0RjUmF0IEJ5IHF3cWRhbmNodW4xCzAJBgNVBAcMAlNIMQswCQYDVQQGEwJDTjAeFw0yMTEwMjAwODIxNThaFw0zMjA3MjkwODIxNThaMBAxDjAMBgNVBAMMBURjUmF0MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCoRh2gPhcjrCexqYsTMZyZzR9nvXDArts2Pxe7vU8QXZ/2N2LtomHs8oIRK8BSNIq8pybY9t19WGwPVl1go5W14d1Gku1DmuB7h/osKUvia9151iX4HtEJzVUZ21JY54BTSNkrB7mO9MIt+NPmW+T434g9pwjXeLqwPn9vNMjlDwIDAQABozIwMDAdBgNVHQ4EFgQUAiSCu6ZEkdGGrjqlINwtfX5B6ncwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQ0FAAOBgQCYJ/7raO8AXKrzJF9npX6m1mUuFIiPNrmznT/3GogAp/JEDW8keA7Mq+IuMV5zjeQ6jrHVToqCFDUPGd3/yMbwmDlQMYjuj+bNl5f5m2pjHKTX1B/QuUUUPLJ/kXiGOb2zml6uK4n5siqJB5Dhza1QKxnOe0RDyLEnlkVondXy6A==", "ServerSignature": "ZbnE26z/kUoafAYsNOaYAdifPsyY0NUimw56hYN83bmpUDLwVLP2BeWbnk3Mb+RyC7+/9H+auM6ptQK6ib0j+DbOdeQNsf+okOIez8zETDI0UKu51c+FUimCHgyZK+I5Z5tXrRFLS4JhVTH6rhdkluo83hNFkwm6R8TV62hDMtE=", "External_config_on_Pastebin": "null", "BDOS": "false", "Startup_Delay": "1", "Group": "Default", "AntiProcess": "false", "AntiVM": "false"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0x115fbc:$b2: DcRat By qwqdanchun1
SourceRuleDescriptionAuthorStrings
0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
  • 0x111f7:$b2: DcRat By qwqdanchun1
  • 0x20733:$b2: DcRat By qwqdanchun1
  • 0x20977:$b2: DcRat By qwqdanchun1
  • 0x24e4b:$b2: DcRat By qwqdanchun1
0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_B64_ArtifactsDetects executables embedding bas64-encoded APIs, command lines, registry keys, etc.ditekSHen
  • 0x3175d:$s1: U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA
  • 0x316ac:$s2: L2Mgc2NodGFza3MgL2
0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DcRat_2Yara detected DcRatJoe Security
    0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_DCRat_1aeea1acunknownunknown
    • 0x28bb:$b2: DcRat By qwqdanchun1
    • 0x8cf3:$b2: DcRat By qwqdanchun1
    • 0x8f2f:$b2: DcRat By qwqdanchun1
    00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      Click to see the 19 entries
      SourceRuleDescriptionAuthorStrings
      0.2.DCwTjs2dTP.exe.abb0000.4.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        0.2.DCwTjs2dTP.exe.abb0000.4.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
        • 0xb33e:$q1: Select * from Win32_CacheMemory
        • 0xb37e:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
        • 0xb3cc:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
        • 0xb41a:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
        0.2.DCwTjs2dTP.exe.abb0000.4.unpackINDICATOR_SUSPICIOUS_EXE_DcRatByDetects executables containing the string DcRatByditekSHen
        • 0xb97a:$s1: DcRatBy
        0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 6 entries
            No Sigma rule has matched
            Timestamp:182.186.88.126192.168.2.36906497402848152 08/05/22-09:16:42.961653
            SID:2848152
            Source Port:6906
            Destination Port:49740
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: DCwTjs2dTP.exeReversingLabs: Detection: 50%
            Source: DCwTjs2dTP.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\sihost.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
            Source: C:\Users\user\AppData\Roaming\sihost.exeReversingLabs: Detection: 50%
            Source: DCwTjs2dTP.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\sihost.exeJoe Sandbox ML: detected
            Source: 0.0.DCwTjs2dTP.exe.b10000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "techandro.giize.com,hsolic.duckdns.org", "Ports": "6906,6907", "Version": " 1.0.7", "Autorun": "true", "Install_Folder": "%AppData%", "Install_File": "sihost.exe", "AES_key": "w28XgttPSPRfTrqDPtKQKIftMUNaIi1O", "Mutex": "DcRatMutex_qwqdanchun", "Certificate": "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", "ServerSignature": "ZbnE26z/kUoafAYsNOaYAdifPsyY0NUimw56hYN83bmpUDLwVLP2BeWbnk3Mb+RyC7+/9H+auM6ptQK6ib0j+DbOdeQNsf+okOIez8zETDI0UKu51c+FUimCHgyZK+I5Z5tXrRFLS4JhVTH6rhdkluo83hNFkwm6R8TV62hDMtE=", "External_config_on_Pastebin": "null", "BDOS": "false", "Startup_Delay": "1", "Group": "Default", "AntiProcess": "false", "AntiVM": "false"}
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABC4E4C CryptFindOIDInfo,0_2_0ABC4E4C
            Source: DCwTjs2dTP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2848152 ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant) 182.186.88.126:6906 -> 192.168.2.3:49740
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Malware configuration extractorURLs: techandro.giize.com
            Source: Malware configuration extractorURLs: hsolic.duckdns.org
            Source: Joe Sandbox ViewASN Name: PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPK PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPK
            Source: global trafficTCP traffic: 192.168.2.3:49740 -> 182.186.88.126:6906
            Source: sihost.exe, 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: sihost.exe, 0000000A.00000002.521463363.0000000000E80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.10.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: sihost.exe, 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabw
            Source: DCwTjs2dTP.exe, 00000000.00000002.533258191.0000000003196000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.531132514.0000000002CEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: unknownDNS traffic detected: queries for: techandro.giize.com

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: sihost.exe, 0000000A.00000002.520705153.0000000000E4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 10.2.sihost.exe.54d0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 10.2.sihost.exe.3b4cbb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 10.2.sihost.exe.3b4cbb0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 10.2.sihost.exe.54d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. Author: ditekSHen
            Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing the string DcRatBy Author: ditekSHen
            Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.546757964.000000000A90A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.527734779.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000003.516805151.000000000A8F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000000.00000002.540094195.000000000478F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.526006194.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 0000000A.00000003.516841569.000000000A90B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: 00000000.00000002.521245478.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 10.2.sihost.exe.54d0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 10.2.sihost.exe.3b4cbb0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 10.2.sihost.exe.3b4cbb0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 10.2.sihost.exe.54d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts author = ditekSHen, description = Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc.
            Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
            Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy author = ditekSHen, description = Detects executables containing the string DcRatBy
            Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.546757964.000000000A90A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.527734779.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000003.516805151.000000000A8F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000000.00000002.540094195.000000000478F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.526006194.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 0000000A.00000003.516841569.000000000A90B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: 00000000.00000002.521245478.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTRMatched rule: Windows_Trojan_DCRat_1aeea1ac os = windows, severity = x86, creation_date = 2022-01-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.DCRat, fingerprint = fc67d76dc916b7736de783aa245483381a8fe071c533f3761e550af80a873fe9, id = 1aeea1ac-69b9-4cc6-91af-18b7a79f35ce, last_modified = 2022-04-12
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013641380_2_01364138
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01361F100_2_01361F10
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01362D100_2_01362D10
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013632300_2_01363230
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367C380_2_01367C38
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013628400_2_01362840
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0136804F0_2_0136804F
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013604480_2_01360448
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013622B00_2_013622B0
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01365BA80_2_01365BA8
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013603900_2_01360390
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01365B990_2_01365B99
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013641F90_2_013641F9
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013641D10_2_013641D1
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013662310_2_01366231
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013666380_2_01366638
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013642270_2_01364227
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013664280_2_01366428
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013666280_2_01366628
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367C280_2_01367C28
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013664190_2_01366419
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0136420C0_2_0136420C
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013674640_2_01367464
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013650680_2_01365068
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013674680_2_01367468
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013612680_2_01361268
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01361E580_2_01361E58
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013650580_2_01365058
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013662400_2_01366240
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013640400_2_01364040
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_013642F30_2_013642F3
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF1BDD10_2_00DF1BDD
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF1F9810_2_00DF1F98
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF0E8810_2_00DF0E88
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_00DF0E7810_2_00DF0E78
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293322B10_2_0293322B
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937A5010_2_02937A50
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293284010_2_02932840
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293044810_2_02930448
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293804F10_2_0293804F
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02931F1010_2_02931F10
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02932D1010_2_02932D10
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293413810_2_02934138
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_029342F310_2_029342F3
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293641910_2_02936419
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293420C10_2_0293420C
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293623110_2_02936231
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293123710_2_02931237
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937A3A10_2_02937A3A
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293663810_2_02936638
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293422710_2_02934227
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293642810_2_02936428
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293662810_2_02936628
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02931E5810_2_02931E58
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293505810_2_02935058
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293744210_2_02937442
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293624010_2_02936240
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293404010_2_02934040
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293506810_2_02935068
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0293746810_2_02937468
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02935B9910_2_02935B99
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02935BA810_2_02935BA8
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_029341D110_2_029341D1
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_029341F910_2_029341F9
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B3945810_2_04B39458
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B3DDF010_2_04B3DDF0
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B3833010_2_04B38330
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B3832010_2_04B38320
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_04B32BD010_2_04B32BD0
            Source: DCwTjs2dTP.exeBinary or memory string: OriginalFilename vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.540773912.00000000047DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe" vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.541024622.000000000482A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000000.250219025.0000000000B36000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exe, 00000000.00000002.540124638.0000000004791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exeBinary or memory string: OriginalFilenamesihost.exe. vs DCwTjs2dTP.exe
            Source: DCwTjs2dTP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: sihost.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: DCwTjs2dTP.exeReversingLabs: Detection: 50%
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile read: C:\Users\user\Desktop\DCwTjs2dTP.exe:Zone.IdentifierJump to behavior
            Source: DCwTjs2dTP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\DCwTjs2dTP.exe "C:\Users\user\Desktop\DCwTjs2dTP.exe"
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\sihost.exe "C:\Users\user\AppData\Roaming\sihost.exe"
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exitJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3 Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\sihost.exe "C:\Users\user\AppData\Roaming\sihost.exe" Jump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile created: C:\Users\user\AppData\Roaming\sihost.exeJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53F0.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.winEXE@14/6@1/1
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: DCwTjs2dTP.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3404:120:WilError_01
            Source: C:\Users\user\AppData\Roaming\sihost.exeMutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5256:120:WilError_01
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: DCwTjs2dTP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: DCwTjs2dTP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABB0EAE push 0000003Eh; retn 0000h0_2_0ABB1208
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABB2FD4 push eax; ret 0_2_0ABB2FDC
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_0ABB13C9 push eax; ret 0_2_0ABB13DD
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_01367240 pushfd ; ret 0_2_01367241
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_02937240 pushfd ; ret 10_2_02937241
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0523C7F0 push eax; mov dword ptr [esp], edx10_2_0523C802
            Source: C:\Users\user\AppData\Roaming\sihost.exeCode function: 10_2_0523E190 push eax; mov dword ptr [esp], edx10_2_0523E1A4
            Source: DCwTjs2dTP.exeStatic PE information: 0xF60FB06B [Tue Oct 26 08:42:19 2100 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.625943654905051
            Source: initial sampleStatic PE information: section name: .text entropy: 7.625943654905051
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile created: C:\Users\user\AppData\Roaming\sihost.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
            Source: C:\Users\user\AppData\Roaming\sihost.exeKey value created or modified: HKEY_CURRENT_USER\Software\C4D93783EC1A25CC28F9 94E168CABBEA0702E60265D1291BE8FE7C37724D89001E7AE9A73817F84114EFJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exe TID: 5180Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exe TID: 5660Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 5164Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 5192Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 5192Thread sleep count: 90 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exe TID: 1892Thread sleep count: 9743 > 30Jump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeWindow / User API: threadDelayed 9743Jump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: sihost.exe, 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}r\
            Source: sihost.exe, 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeCode function: 0_2_02EC9028 mov eax, dword ptr fs:[00000030h]0_2_02EC9028
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exitJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3 Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\sihost.exe "C:\Users\user\AppData\Roaming\sihost.exe" Jump to behavior
            Source: sihost.exe, 0000000A.00000002.532020880.0000000002D67000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.531872890.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeQueries volume information: C:\Users\user\Desktop\DCwTjs2dTP.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Users\user\AppData\Roaming\sihost.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\sihost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DCwTjs2dTP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.DCwTjs2dTP.exe.abb0000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\sihost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: DCwTjs2dTP.exe, DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: MSASCui.exe
            Source: DCwTjs2dTP.exe, DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: procexp.exe
            Source: DCwTjs2dTP.exe, DCwTjs2dTP.exe, 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DCwTjs2dTP.exe PID: 5664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: sihost.exe PID: 5352, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Windows Management Instrumentation
            2
            Scheduled Task/Job
            12
            Process Injection
            1
            Masquerading
            1
            Input Capture
            1
            Query Registry
            Remote Services1
            Input Capture
            Exfiltration Over Other Network Medium2
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts2
            Scheduled Task/Job
            Boot or Logon Initialization Scripts2
            Scheduled Task/Job
            1
            Modify Registry
            LSASS Memory121
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain Accounts1
            Scripting
            Logon Script (Windows)Logon Script (Windows)1
            Disable or Modify Tools
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)21
            Virtualization/Sandbox Evasion
            NTDS21
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureScheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script12
            Process Injection
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Scripting
            Cached Domain Credentials1
            Remote System Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items12
            Obfuscated Files or Information
            DCSync1
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job3
            Software Packing
            Proc Filesystem13
            System Information Discovery
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            Timestomp
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 679101 Sample: DCwTjs2dTP.exe Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 6 other signatures 2->45 7 DCwTjs2dTP.exe 9 2->7         started        process3 file4 27 C:\Users\user\AppData\Roaming\sihost.exe, PE32 7->27 dropped 29 C:\Users\user\AppData\...\DCwTjs2dTP.exe.log, ASCII 7->29 dropped 10 cmd.exe 1 7->10         started        12 cmd.exe 1 7->12         started        process5 signatures6 15 sihost.exe 2 4 10->15         started        19 conhost.exe 10->19         started        21 timeout.exe 1 10->21         started        47 Uses schtasks.exe or at.exe to add and modify task schedules 12->47 23 conhost.exe 12->23         started        25 schtasks.exe 1 12->25         started        process7 dnsIp8 31 techandro.giize.com 182.186.88.126, 49740, 49799, 6906 PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPK Pakistan 15->31 33 Antivirus detection for dropped file 15->33 35 Multi AV Scanner detection for dropped file 15->35 37 Machine Learning detection for dropped file 15->37 signatures9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            DCwTjs2dTP.exe50%ReversingLabsByteCode-MSIL.Backdoor.Crysan
            DCwTjs2dTP.exe100%AviraTR/Dropper.MSIL.Gen
            DCwTjs2dTP.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\sihost.exe100%AviraTR/Dropper.MSIL.Gen
            C:\Users\user\AppData\Roaming\sihost.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\sihost.exe50%ReversingLabsByteCode-MSIL.Backdoor.Crysan
            SourceDetectionScannerLabelLinkDownload
            0.0.DCwTjs2dTP.exe.b10000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            hsolic.duckdns.org0%Avira URL Cloudsafe
            techandro.giize.com0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            techandro.giize.com
            182.186.88.126
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              hsolic.duckdns.orgtrue
              • Avira URL Cloud: safe
              unknown
              techandro.giize.comtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDCwTjs2dTP.exe, 00000000.00000002.533258191.0000000003196000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, sihost.exe, 0000000A.00000002.531132514.0000000002CEE000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                182.186.88.126
                techandro.giize.comPakistan
                45595PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPKtrue
                Joe Sandbox Version:35.0.0 Citrine
                Analysis ID:679101
                Start date and time: 05/08/202209:15:112022-08-05 09:15:11 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 20s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:DCwTjs2dTP.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:35
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.winEXE@14/6@1/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 5.7% (good quality ratio 4.1%)
                • Quality average: 53.9%
                • Quality standard deviation: 40%
                HCA Information:
                • Successful, ratio: 94%
                • Number of executed functions: 156
                • Number of non-executed functions: 14
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 23.211.6.115, 173.222.108.226, 20.189.173.21
                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                09:16:25Task SchedulerRun new task: sihost path: "C:\Users\user\AppData\Roaming\sihost.exe"
                09:16:44API Interceptor1x Sleep call for process: sihost.exe modified
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                PKTELECOM-AS-PKPakistanTelecomCompanyLimitedPKxd.x86Get hashmaliciousBrowse
                • 39.45.107.193
                dsUW8nBcj0Get hashmaliciousBrowse
                • 182.184.188.9
                arm7Get hashmaliciousBrowse
                • 182.184.178.45
                lge6y1mqreGet hashmaliciousBrowse
                • 39.58.236.128
                hRqJDxXD2zGet hashmaliciousBrowse
                • 39.32.23.211
                botx.mpslGet hashmaliciousBrowse
                • 39.36.156.29
                OqrBUGKdjoGet hashmaliciousBrowse
                • 39.55.155.195
                SecuriteInfo.com.Linux.Siggen.9999.5381.26016Get hashmaliciousBrowse
                • 39.36.70.206
                85bjW988pjGet hashmaliciousBrowse
                • 182.179.188.143
                bHLdG1iUdOGet hashmaliciousBrowse
                • 39.43.110.228
                ECoE9arearGet hashmaliciousBrowse
                • 119.153.180.210
                tfrCRlebe7Get hashmaliciousBrowse
                • 119.153.33.9
                iGV79YZMmbGet hashmaliciousBrowse
                • 119.154.170.150
                1a2p2SA6xgGet hashmaliciousBrowse
                • 119.157.251.131
                2vrW5rkBa6Get hashmaliciousBrowse
                • 119.153.180.241
                047KCi3D28.dllGet hashmaliciousBrowse
                • 182.185.176.223
                1RkKYhC6Ju.dllGet hashmaliciousBrowse
                • 39.63.176.216
                HhDMZKWBi5.dllGet hashmaliciousBrowse
                • 182.191.250.21
                home.mpslGet hashmaliciousBrowse
                • 39.40.43.255
                jTpjSXxHjt.dllGet hashmaliciousBrowse
                • 39.52.47.76
                No context
                No context
                Process:C:\Users\user\AppData\Roaming\sihost.exe
                File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                Category:dropped
                Size (bytes):61712
                Entropy (8bit):7.995044632446497
                Encrypted:true
                SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                MD5:589C442FC7A0C70DCA927115A700D41E
                SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                Process:C:\Users\user\AppData\Roaming\sihost.exe
                File Type:data
                Category:modified
                Size (bytes):326
                Entropy (8bit):3.1358915940078615
                Encrypted:false
                SSDEEP:6:kKku+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:rNkPlE99SNxAhUeE1
                MD5:CCCAC476B9113FEE393FAAE046C51F0B
                SHA1:C234350AFAE80DA95858F154CF4839421C1C2C62
                SHA-256:EE0601D893B6A6978040DCA0C315C7855E278DD1264DE7AF85B91CB2B4C33882
                SHA-512:81A9355BE6696ECBEAFD7ADA021F83E105AA42B61F981BCB597B6874C67847456CC7FD975348BC15E58DDDBAB64091E3DF0FE620FDCCB870FCC28C758E1CAB78
                Malicious:false
                Reputation:low
                Preview:p...... ...............(....................................................... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
                Process:C:\Users\user\Desktop\DCwTjs2dTP.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):425
                Entropy (8bit):5.340009400190196
                Encrypted:false
                SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
                MD5:CC144808DBAF00E03294347EADC8E779
                SHA1:A3434FC71BA82B7512C813840427C687ADDB5AEA
                SHA-256:3FC7B9771439E777A8F8B8579DD499F3EB90859AD30EFD8A765F341403FC7101
                SHA-512:A4F9EB98200BCAF388F89AABAF7EA57661473687265597B13192C24F06638C6339A3BD581DF4E002F26EE1BA09410F6A2BBDB4DA0CD40B59D63A09BAA1AADD3D
                Malicious:true
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                Process:C:\Users\user\Desktop\DCwTjs2dTP.exe
                File Type:DOS batch file, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):150
                Entropy (8bit):5.092134229634079
                Encrypted:false
                SSDEEP:3:mKDDCMNqTtvL5oWXp5cViEaKC5UWvSmqRDWXp5cViE2J5xAInTRI6WcZPy:hWKqTtT6WXp+NaZ5UWKmq1WXp+N23fTg
                MD5:F02730A3503455275DA10EFB33B82C09
                SHA1:76322B42303DBB065740A423FB414CEF653671E5
                SHA-256:09BE09339F9A333B4BA5580D3F6F6E9E928A5A13A1C6448631FAFB1AB0332D6D
                SHA-512:FE402C93721D335BFD90E8D1C2760D0BE95BA95F32FF7675F3B3A465192B5F766ECE30E472D91DAB5F262A4BDB2892854CB1C01E2BC84C6E20CB34EBBFEC96F4
                Malicious:false
                Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\sihost.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmp53F0.tmp.bat" /f /q..
                Process:C:\Users\user\Desktop\DCwTjs2dTP.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):144384
                Entropy (8bit):7.592025541663874
                Encrypted:false
                SSDEEP:1536:kbe1mZ5AK6G/WV+22ihLk3jb6B4LGt/XzNNu0oTj7A64MWy/ASOlvL4h59MfoZ+G:ZiLe+22iUXlGlXRN+zA6cQAp+ofoZ+G
                MD5:2ED2A1D6604AFEAA681F4C66DCD84194
                SHA1:6134D837220AFE9377CD78950C8ACA43DDE08D8C
                SHA-256:2A48FA5118BF1C97DE6A6B7B0A45BCC95BD678D54F31E2F2D003E5F3EA49C780
                SHA-512:B6DC02F1974D0D90B171432156B85044AB67B51C00C9A6F2CE98562342DD2AFB64AC36AE57E291D37DA0DB564C7191567183917971455969D9EB930C920E8979
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 50%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k............."...0..*...........I... ...`....@.. ....................................`..................................H..W....`............................................................................... ............... ..H............text....)... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............2..............@..B.................H......H...........$l......;....................................................i,.7.=.v.":.....`.t.......>D.5./dos..D+..w..5...<Dp..=?.{....3eKn...f.Q....y......,.>\..8..R:+^H..6..l..H.W"..Y...TVf./..,.w..p.!........S.....x&.1...f.V...u..3O.....X.6xmb.....x.T..IwEY.t.%5..5....1Ca....|1.Z1.gW..sa..E..+.w..x7=..N...8QY5.y.H....L..OJ...2.......<=..=cx.M....s..F...^....S...5........O.....?S.AU.s......:..........@..(=.Nt...q.4!..I......j.R|..t.b...GA.{.7..i(.I.G2..z.u..y.6
                Process:C:\Windows\SysWOW64\timeout.exe
                File Type:ASCII text, with CRLF line terminators, with overstriking
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.41440934524794
                Encrypted:false
                SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                MD5:3DD7DD37C304E70A7316FE43B69F421F
                SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                Malicious:false
                Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.592025541663874
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:DCwTjs2dTP.exe
                File size:144384
                MD5:2ed2a1d6604afeaa681f4c66dcd84194
                SHA1:6134d837220afe9377cd78950c8aca43dde08d8c
                SHA256:2a48fa5118bf1c97de6a6b7b0a45bcc95bd678d54f31e2f2d003e5f3ea49c780
                SHA512:b6dc02f1974d0d90b171432156b85044ab67b51c00c9a6f2ce98562342dd2afb64ac36ae57e291d37da0db564c7191567183917971455969d9eb930c920e8979
                SSDEEP:1536:kbe1mZ5AK6G/WV+22ihLk3jb6B4LGt/XzNNu0oTj7A64MWy/ASOlvL4h59MfoZ+G:ZiLe+22iUXlGlXRN+zA6cQAp+ofoZ+G
                TLSH:D4E36B9D366036DFC867C872CAA82CA8AA50747B471BD203A45715EEDE4D99BCF050F3
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k............."...0..*...........I... ...`....@.. ....................................`................................
                Icon Hash:00828e8e8686b000
                Entrypoint:0x42490e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0xF60FB06B [Tue Oct 26 08:42:19 2100 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x248b40x57.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x596.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x280000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x229140x22a00False0.8304095216606499SysEx File - Victor7.625943654905051IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x260000x5960x600False0.412109375data4.024186334587364IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x280000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_VERSION0x260a00x30cdata
                RT_MANIFEST0x263ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                DLLImport
                mscoree.dll_CorExeMain
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                182.186.88.126192.168.2.36906497402848152 08/05/22-09:16:42.961653TCP2848152ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant)690649740182.186.88.126192.168.2.3
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 09:16:42.343604088 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:42.507725000 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:42.507963896 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:42.793518066 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:42.961652994 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:42.980221033 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:43.147313118 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:43.202167988 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:46.467544079 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:46.836049080 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:46.836447001 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:47.193211079 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.082192898 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:58.449898958 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.450030088 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:58.612859011 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.734793901 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:58.906966925 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:58.953510046 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:59.070375919 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:59.440320969 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:16:59.441751003 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:16:59.811695099 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:05.920444012 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:05.969835997 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:06.131196976 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:06.173055887 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.167838097 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.545608044 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:10.545766115 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.730561972 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:10.782721996 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:10.952214003 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:11.004468918 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:11.991069078 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:12.361207008 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:12.361320972 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:12.723164082 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:21.618616104 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:21.978775024 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:21.979440928 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:22.142467022 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:22.189888000 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:22.352082014 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:22.379858017 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:22.742747068 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:22.743539095 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:23.120084047 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:33.216279030 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:33.586165905 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:33.586325884 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:33.750921965 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:33.878433943 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:34.040781975 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:34.080080032 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:34.441732883 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:34.442347050 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:34.888081074 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:35.953671932 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:36.003654957 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:36.184784889 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:36.237941027 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:44.886441946 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:45.245990038 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:45.247559071 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:45.411969900 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:45.504420042 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:45.665941000 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:45.682383060 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:46.049994946 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:46.050144911 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:46.436414957 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:56.406936884 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:56.767236948 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:56.767338991 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:56.949023008 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:57.146131992 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:57.307141066 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:57.372817039 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:57.735706091 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:17:57.735805988 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:17:58.094325066 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:05.973809958 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:06.146740913 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:06.311863899 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:06.443659067 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.011923075 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.389894009 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:08.390151978 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.563564062 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:08.740721941 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:08.901375055 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:08.914977074 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:09.280356884 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:09.280605078 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:09.526557922 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:09.647113085 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:09.808506966 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:09.869719028 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.230223894 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.230392933 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.584258080 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.586045027 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.587495089 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.588771105 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.589605093 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.589751005 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.591027975 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.647125006 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.753017902 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.753572941 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.753783941 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.755080938 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.756288052 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.756397009 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.757787943 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.758994102 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.759123087 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.809803963 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.811302900 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.811408043 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.916563034 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.917579889 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.917722940 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.918993950 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.920238018 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.921958923 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.922312021 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.923487902 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.923563957 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.925045013 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.926260948 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.927730083 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.927826881 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.929244995 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.929687977 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:10.930489063 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.932061911 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:10.933664083 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.004995108 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.006314039 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.006388903 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.007514954 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.009011984 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.009203911 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.082937956 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.084306955 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.084408998 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.085014105 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.086539984 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.086776972 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.087745905 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.089494944 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.089720964 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.090972900 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.092341900 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.093746901 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.093818903 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.094994068 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.095515013 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.096517086 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.097781897 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.097879887 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.099288940 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.100575924 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.100658894 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.101989985 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.103533030 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.103622913 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.104758978 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.106441975 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.106513023 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.107522011 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.109072924 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.109715939 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.111267090 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.112736940 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.112811089 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.114070892 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.115508080 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.115581989 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.172063112 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.183742046 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.185039043 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.185122013 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.186456919 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.187011957 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.187706947 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.189218044 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.189277887 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.190514088 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.192001104 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.192053080 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.246885061 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.248333931 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.249716043 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.249830008 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.250952959 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.251072884 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.252481937 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.253711939 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.253771067 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.255209923 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.256594896 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.257229090 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.258091927 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.259366989 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.259458065 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.260284901 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.261758089 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.261852026 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.268582106 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.270133972 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.270212889 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.271217108 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.272758007 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.275338888 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.285178900 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.286623001 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.286726952 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.287877083 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.289259911 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.290482044 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.290668964 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.291498899 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.291568041 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.292987108 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.294214964 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.294317961 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.295769930 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.296960115 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.297028065 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.298474073 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.299758911 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.300085068 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.301259995 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.302469015 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.304279089 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.351023912 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.352504969 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.352615118 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.353744984 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.355207920 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.355382919 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.364139080 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.365329981 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.365437031 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.367288113 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.368570089 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.372172117 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.412767887 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.414175034 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.414304018 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.415467978 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.416982889 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.417263031 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.418190956 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.419739962 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.420568943 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.420977116 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.422472954 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.422533035 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.424030066 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.425332069 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.425425053 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.426742077 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.427983999 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.428077936 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.435035944 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.436230898 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.437747002 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.437879086 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.439254999 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.439338923 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:11.449199915 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.450824976 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.451169968 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:11.451323032 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:20.183955908 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:20.545418978 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:20.545516014 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:20.660738945 CEST497996906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:20.724066019 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:20.724600077 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:20.869071007 CEST690649799182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:20.869306087 CEST497996906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:20.870156050 CEST497996906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:20.889235973 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:20.944876909 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:21.022531033 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:21.043155909 CEST690649799182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:21.044353008 CEST497996906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:21.395819902 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:21.395905018 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:21.424721003 CEST690649799182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:21.772886038 CEST690649740182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:22.096901894 CEST497996906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:22.102404118 CEST497406906192.168.2.3182.186.88.126
                Aug 5, 2022 09:18:22.269476891 CEST690649799182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:22.271547079 CEST690649799182.186.88.126192.168.2.3
                Aug 5, 2022 09:18:22.271667004 CEST497996906192.168.2.3182.186.88.126
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 09:16:42.094877958 CEST4931653192.168.2.38.8.8.8
                Aug 5, 2022 09:16:42.273111105 CEST53493168.8.8.8192.168.2.3
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Aug 5, 2022 09:16:42.094877958 CEST192.168.2.38.8.8.80xf053Standard query (0)techandro.giize.comA (IP address)IN (0x0001)
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Aug 5, 2022 09:16:42.273111105 CEST8.8.8.8192.168.2.30xf053No error (0)techandro.giize.com182.186.88.126A (IP address)IN (0x0001)

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:09:16:16
                Start date:05/08/2022
                Path:C:\Users\user\Desktop\DCwTjs2dTP.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\DCwTjs2dTP.exe"
                Imagebase:0xb10000
                File size:144384 bytes
                MD5 hash:2ED2A1D6604AFEAA681F4C66DCD84194
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: INDICATOR_SUSPICIOUS_EXE_DcRatBy, Description: Detects executables containing the string DcRatBy, Source: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.540094195.000000000478F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.526006194.0000000002F00000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 00000000.00000002.521245478.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:2
                Start time:09:16:24
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"' & exit
                Imagebase:0xc20000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:09:16:24
                Start date:05/08/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7c9170000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:4
                Start time:09:16:24
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp53F0.tmp.bat""
                Imagebase:0xc20000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:5
                Start time:09:16:25
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\schtasks.exe
                Wow64 process (32bit):true
                Commandline:schtasks /create /f /sc onlogon /rl highest /tn "sihost" /tr '"C:\Users\user\AppData\Roaming\sihost.exe"'
                Imagebase:0x920000
                File size:185856 bytes
                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:7
                Start time:09:16:25
                Start date:05/08/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7c9170000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:8
                Start time:09:16:26
                Start date:05/08/2022
                Path:C:\Windows\SysWOW64\timeout.exe
                Wow64 process (32bit):true
                Commandline:timeout 3
                Imagebase:0x1360000
                File size:26112 bytes
                MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:10
                Start time:09:16:29
                Start date:05/08/2022
                Path:C:\Users\user\AppData\Roaming\sihost.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Roaming\sihost.exe"
                Imagebase:0x7a0000
                File size:144384 bytes
                MD5 hash:2ED2A1D6604AFEAA681F4C66DCD84194
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.522471112.0000000000EC9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_B64_Artifacts, Description: Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc., Source: 0000000A.00000002.543917229.00000000054D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.531729380.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.526339237.0000000002ACF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.546757964.000000000A90A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.527734779.0000000002B49000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000003.516805151.000000000A8F3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000002.523503805.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_DCRat_1aeea1ac, Description: unknown, Source: 0000000A.00000003.516841569.000000000A90B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                • Detection: 50%, ReversingLabs
                Reputation:low

                Reset < >

                  Execution Graph

                  Execution Coverage:15.8%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:4.9%
                  Total number of Nodes:102
                  Total number of Limit Nodes:8
                  execution_graph 6064 abc4bc8 6069 abc50c8 6064->6069 6065 abc4bea 6077 abc5a10 6065->6077 6066 abc4bf4 6070 abc50de 6069->6070 6071 abc50e6 6070->6071 6072 abc51a4 6070->6072 6073 abc512f 6071->6073 6076 abc50c8 CryptFindOIDInfo 6071->6076 6074 abc5221 6072->6074 6085 abc5258 6072->6085 6073->6065 6074->6065 6076->6073 6078 abc5a39 6077->6078 6080 abc5a1c 6077->6080 6079 abc5aab 6078->6079 6078->6080 6081 abc5b46 6078->6081 6104 abc5c68 6079->6104 6080->6066 6082 abc5be0 6081->6082 6083 abc5628 CryptFindOIDInfo 6081->6083 6082->6066 6083->6082 6090 abc52a0 6085->6090 6087 abc5284 6087->6074 6089 abc52a0 CryptFindOIDInfo 6089->6087 6092 abc52c4 6090->6092 6093 abc5330 6090->6093 6091 abc526e 6091->6087 6091->6089 6092->6091 6095 abc5628 6092->6095 6096 abc5651 6095->6096 6099 abc56f6 6095->6099 6096->6099 6100 abc4e4c 6096->6100 6101 abc5778 CryptFindOIDInfo 6100->6101 6103 abc5805 6101->6103 6105 abc5c74 6104->6105 6106 abc5c7b 6104->6106 6108 abc5b90 6105->6108 6106->6080 6109 abc5ba8 6108->6109 6111 abc5be0 6108->6111 6110 abc5628 CryptFindOIDInfo 6109->6110 6110->6111 6111->6106 5997 1368490 5998 13684d8 VirtualAlloc 5997->5998 5999 1368543 5998->5999 6000 1367a50 6002 1367a59 6000->6002 6001 1367bb8 6002->6001 6004 1368789 6002->6004 6005 13687b2 6004->6005 6009 13686a0 6005->6009 6013 13686a8 6005->6013 6006 13687c9 6006->6002 6011 13686a6 6009->6011 6010 1368728 6010->6006 6017 2ec7537 6011->6017 6014 13686ec 6013->6014 6016 2ec7537 14 API calls 6014->6016 6015 1368728 6015->6006 6016->6015 6036 2ec9028 GetPEB 6017->6036 6019 2ec7557 6020 2ec9028 GetPEB 6019->6020 6021 2ec756b 6020->6021 6022 2ec7584 VirtualAlloc 6021->6022 6025 2ec76e8 6021->6025 6023 2ec759b 6022->6023 6022->6025 6024 2ec9028 GetPEB 6023->6024 6023->6025 6026 2ec760d 6024->6026 6025->6010 6026->6025 6027 2ec762b LoadLibraryA 6026->6027 6029 2ec763b 6026->6029 6027->6027 6027->6029 6028 2ec9028 GetPEB 6028->6029 6029->6025 6029->6028 6030 2ec7677 6029->6030 6030->6025 6033 2ec76c8 6030->6033 6038 2ec79e7 LoadLibraryA 6030->6038 6033->6025 6058 2ec83f9 6033->6058 6037 2ec903c 6036->6037 6037->6019 6039 2ec7a04 6038->6039 6040 2ec76b5 6038->6040 6039->6040 6041 2ec7a2c VirtualProtect 6039->6041 6040->6025 6048 2ec7acd 6040->6048 6041->6040 6042 2ec7a40 6041->6042 6043 2ec7a5a VirtualProtect 6042->6043 6044 2ec7a76 6043->6044 6044->6040 6045 2ec7a8a VirtualProtect 6044->6045 6045->6040 6046 2ec7a9a 6045->6046 6047 2ec7aaf VirtualProtect 6046->6047 6047->6040 6050 2ec7ade 6048->6050 6049 2ec7ae4 6049->6033 6050->6049 6051 2ec7b12 VirtualProtect 6050->6051 6051->6049 6052 2ec7b26 6051->6052 6053 2ec7b40 VirtualProtect 6052->6053 6054 2ec7b5c 6053->6054 6054->6049 6055 2ec7b70 VirtualProtect 6054->6055 6055->6049 6056 2ec7b80 6055->6056 6057 2ec7b95 VirtualProtect 6056->6057 6057->6049 6060 2ec841b 6058->6060 6059 2ec85be 6059->6025 6060->6059 6061 2ec8509 SafeArrayCreate 6060->6061 6061->6059 6062 2ec852e 6061->6062 6063 2ec85ba SafeArrayDestroy 6062->6063 6063->6059 6116 1367a0a 6118 1367a0f 6116->6118 6117 1367bb8 6118->6117 6119 1368789 14 API calls 6118->6119 6119->6118 6112 1368489 6113 136848f VirtualAlloc 6112->6113 6115 1368543 6113->6115

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 175 1362840-1362871 177 1362873 175->177 178 1362878-136289d 175->178 177->178 179 13628a4-13628b0 178->179 180 136289f 178->180 181 13628b3 179->181 180->179 182 13628ba-13628d6 181->182 183 13628df-13628e0 182->183 184 13628d8 182->184 185 1362a24-1362a28 183->185 184->181 184->183 184->185 186 13628e5-13628eb 184->186 187 13629b3-13629ba 184->187 188 1362a0d-1362a1f 184->188 189 136297b-1362985 184->189 190 136294b-136294f 184->190 191 1362928-136292b 184->191 192 1362908-1362926 184->192 205 13628ee call 1362cb8 186->205 206 13628ee call 1362cc8 186->206 193 13629c1-1362a08 187->193 194 13629bc 187->194 188->182 197 1362987 189->197 198 136298c-13629ae 189->198 195 1362962-1362969 190->195 196 1362951-1362960 190->196 203 136292e call 1362a60 191->203 204 136292e call 1362a68 191->204 192->182 193->182 194->193 202 1362970-1362976 195->202 196->202 197->198 198->182 199 13628f4-1362906 199->182 201 1362934-1362946 201->182 202->182 203->201 204->201 205->199 206->199
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: A,:$A,:
                  • API String ID: 0-3023365590
                  • Opcode ID: 57782421efe35a305428fe09f9bfa853c141a7584e78c30fd7221435bd3082c5
                  • Instruction ID: 850f5a7bb7dac6d4d4176f8d429bff49d007193e7b37f3cc5dd97392def25593
                  • Opcode Fuzzy Hash: 57782421efe35a305428fe09f9bfa853c141a7584e78c30fd7221435bd3082c5
                  • Instruction Fuzzy Hash: 42514A70E052098FDB08CFAAC9406AEFFFAFF89305F15C06AD419A7255D77449018F95
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 207 abc4e4c-abc5803 CryptFindOIDInfo 210 abc580c-abc5846 207->210 211 abc5805-abc580b 207->211 215 abc5848 210->215 216 abc5850 210->216 211->210 215->216
                  APIs
                  • CryptFindOIDInfo.CRYPT32(?,00000000,?), ref: 0ABC57F3
                  Memory Dump Source
                  • Source File: 00000000.00000002.542857565.000000000ABC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABB0000, based on PE: true
                  • Associated: 00000000.00000002.542742208.000000000ABB0000.00000004.08000000.00040000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_abb0000_DCwTjs2dTP.jbxd
                  Yara matches
                  Similarity
                  • API ID: CryptFindInfo
                  • String ID:
                  • API String ID: 4232373045-0
                  • Opcode ID: 802ac833146a035a7f0ff2a9cec606b2651ad166e2cfbf162d894b80c6243a11
                  • Instruction ID: 2578a315b515557ef4a6ef3ef20064027df35b62fd37b3dba2fdb79c02331f3d
                  • Opcode Fuzzy Hash: 802ac833146a035a7f0ff2a9cec606b2651ad166e2cfbf162d894b80c6243a11
                  • Instruction Fuzzy Hash: E42113B0D00258EFCB24CFA9C484BDEBFF4AB48304F14816AE805A7351EB74A944CFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 217 1364227-1364238 218 1364190-13641ac 217->218 219 136423d-1364249 217->219 220 13641b5-13645a2 218->220 221 13641ae 218->221 222 1364250-136426f 219->222 223 136424b 219->223 221->219 221->220 224 1364274-1364280 221->224 225 13643b5-13643c7 221->225 226 1364473-1364488 221->226 227 1364571-136457d 221->227 228 136429e-13642b3 221->228 229 136437f-1364398 call 13647b0 221->229 230 136443f-136444b 221->230 231 136453d-1364549 221->231 232 13644bd-13644c9 221->232 233 13641bb-13641cf 221->233 234 13642b8-13642cf 221->234 235 1364521-1364538 221->235 236 136436d-136437a 221->236 237 136448d-1364491 221->237 238 136440b-1364417 221->238 239 1364189 221->239 240 1364309-136430d 221->240 222->218 223->222 245 1364287-1364299 224->245 246 1364282 224->246 225->218 226->218 253 1364584-1364596 227->253 254 136457f 227->254 228->218 262 136439e-13643b0 229->262 257 1364452 230->257 258 136444d 230->258 251 1364550-136456c 231->251 252 136454b 231->252 247 13644d0-13644ec 232->247 248 13644cb 232->248 233->218 234->218 235->218 236->218 243 13644a4-13644ab 237->243 244 1364493-13644a2 237->244 255 136441e-136443a 238->255 256 1364419 238->256 239->218 249 1364320-1364327 240->249 250 136430f-136431e 240->250 259 13644b2-13644b8 243->259 244->259 245->218 246->245 247->218 248->247 261 136432e-1364334 249->261 250->261 251->218 252->251 253->218 254->253 255->218 256->255 263 136445c-136446e 257->263 258->257 259->218 261->218 262->218 263->218
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: WS0c
                  • API String ID: 0-312049407
                  • Opcode ID: 83b297a4b83f9a24c86770db2a6ea53f9ac800e34d4e6d9469bcc7fef59f2124
                  • Instruction ID: a97d1c6e351ba1c20074734c4e3fa8c7e53d3cbf8c9ca2a4b92736c5bd1c3001
                  • Opcode Fuzzy Hash: 83b297a4b83f9a24c86770db2a6ea53f9ac800e34d4e6d9469bcc7fef59f2124
                  • Instruction Fuzzy Hash: 028148B0E1420ADFCB04CF95D4818AEFBBAFF89304B25D555C516AB618D734EA86CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 270 136804f-1368089 272 1368090-13680a8 270->272 273 136808b 270->273 274 13680a9 272->274 273->272 275 13680b0-13680cc 274->275 276 13680d5-13680d6 275->276 277 13680ce 275->277 282 136823e-1368274 276->282 277->274 277->276 278 1368207-136820b 277->278 279 1368152-1368165 277->279 280 13681b2-13681c3 277->280 281 1368182-13681ad 277->281 277->282 283 13680ef-13680f7 call 13682e0 277->283 284 13681ef-1368202 277->284 285 136811d-136814d 277->285 286 136816a-136817d 277->286 287 13680db-13680ed 277->287 290 136821e-1368225 278->290 291 136820d-136821c 278->291 279->275 288 13681d6-13681dd 280->288 289 13681c5-13681d4 280->289 281->275 300 1368276-136827f 282->300 301 1368295 282->301 295 13680fd-136811b 283->295 284->275 285->275 286->275 287->275 293 13681e4-13681ea 288->293 289->293 294 136822c-1368239 290->294 291->294 293->275 294->275 295->275 302 1368286-1368289 300->302 303 1368281-1368284 300->303 304 1368298-13682a9 301->304 305 1368293 302->305 303->305 305->304
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: @
                  • API String ID: 0-2766056989
                  • Opcode ID: aae3c5e93619c05abcfa98d886e990d9ecce4e038e8d2c91be23c3f16e17078e
                  • Instruction ID: 78985af9fabb67cb1fff953b6ad3f69577b9e6f78052a5863e72775024606d8b
                  • Opcode Fuzzy Hash: aae3c5e93619c05abcfa98d886e990d9ecce4e038e8d2c91be23c3f16e17078e
                  • Instruction Fuzzy Hash: 12615BB4D0530DDFDB04CFA9C5856AEBBB5FB88304F20986AD105BB358E7349A46CB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 308 1367c38-1367c5a 309 1367c61-1367c6f 308->309 310 1367c5c 308->310 311 1367c85 309->311 312 1367c71-1367c83 309->312 310->309 313 1367c88-1367c8f 311->313 312->313 314 1367c95 313->314 315 1367d5a-1367d66 313->315 316 1367c9c-1367cb8 314->316 330 1367d68-1367d77 315->330 331 1367d79-1367d80 315->331 317 1367cc1-1367cc2 316->317 318 1367cba 316->318 322 1367e91-1367e92 317->322 318->314 318->315 318->317 320 1367e57-1367e78 318->320 321 1367d92-1367da3 318->321 318->322 323 1367e1f 318->323 324 1367e7d-1367e8c 318->324 325 1367d1b-1367d27 318->325 326 1367cc7-1367d19 318->326 327 1367e40 318->327 328 1367dcf-1367de8 318->328 329 1367ded-1367e01 318->329 320->316 342 1367db6-1367dbd 321->342 343 1367da5-1367db4 321->343 322->315 336 1367e29-1367e3b 323->336 324->316 344 1367d3a-1367d41 325->344 345 1367d29-1367d38 325->345 326->316 338 1367e4a-1367e52 327->338 328->316 347 1367e08-1367e1a 329->347 332 1367d87-1367d8d 330->332 331->332 332->316 336->316 338->316 349 1367dc4-1367dca 342->349 343->349 346 1367d48-1367d55 344->346 345->346 346->316 347->316 349->316
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: c{
                  • API String ID: 0-1832256588
                  • Opcode ID: bcf9dac6cb50fc2d9341808c911ceae587beefe2ef448f69657a6fd62f40b8ad
                  • Instruction ID: 8a507ab30691d6168a7c299e4a43a44eddb7e28a5da9aa2c74fefd0c9c5fbc4f
                  • Opcode Fuzzy Hash: bcf9dac6cb50fc2d9341808c911ceae587beefe2ef448f69657a6fd62f40b8ad
                  • Instruction Fuzzy Hash: 55614874E05209DFCF54CFA5C4406AEBBBAEF89308F50D829D412AB358DB789A41CF54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 352 1367c28-1367c5a 353 1367c61-1367c6f 352->353 354 1367c5c 352->354 355 1367c85 353->355 356 1367c71-1367c83 353->356 354->353 357 1367c88-1367c8f 355->357 356->357 358 1367c95 357->358 359 1367d5a-1367d66 357->359 360 1367c9c-1367cb8 358->360 374 1367d68-1367d77 359->374 375 1367d79-1367d80 359->375 361 1367cc1-1367cc2 360->361 362 1367cba 360->362 366 1367e91-1367e92 361->366 362->358 362->359 362->361 364 1367e57-1367e78 362->364 365 1367d92-1367da3 362->365 362->366 367 1367e1f 362->367 368 1367e7d-1367e8c 362->368 369 1367d1b-1367d27 362->369 370 1367cc7-1367d19 362->370 371 1367e40 362->371 372 1367dcf-1367de8 362->372 373 1367ded-1367df0 362->373 364->360 386 1367db6-1367dbd 365->386 387 1367da5-1367db4 365->387 366->359 380 1367e29-1367e3b 367->380 368->360 388 1367d3a-1367d41 369->388 389 1367d29-1367d38 369->389 370->360 382 1367e4a-1367e52 371->382 372->360 378 1367df8-1367e01 373->378 376 1367d87-1367d8d 374->376 375->376 376->360 391 1367e08-1367e1a 378->391 380->360 382->360 393 1367dc4-1367dca 386->393 387->393 390 1367d48-1367d55 388->390 389->390 390->360 391->360 393->360
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: c{
                  • API String ID: 0-1832256588
                  • Opcode ID: f60b837fea17ee5e5efb29c905aacdaed429584ee692ce5b603e544ad0092ef9
                  • Instruction ID: a06734ed704a8fc5e72d9b83adf4bd17e6451ba7f1d0e0e5ce4fe2bd49449b3a
                  • Opcode Fuzzy Hash: f60b837fea17ee5e5efb29c905aacdaed429584ee692ce5b603e544ad0092ef9
                  • Instruction Fuzzy Hash: 20513A74E15209DFDF58CFB5C4406AEBBBAEF85308F40D86AD012AB668DB788945CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fdee86966984d38a0f5e439ba83b877541afaabc4adca5618708eef5379a2b59
                  • Instruction ID: b0b3fee4308e9146dd64bf4f6d5a37b4ad62b4e1b37ab95e48040eb12a6f2801
                  • Opcode Fuzzy Hash: fdee86966984d38a0f5e439ba83b877541afaabc4adca5618708eef5379a2b59
                  • Instruction Fuzzy Hash: 96D13374E053198FDB58CFA9C9809EEBBF6FF89314F20856AD405AB258D7359A02CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e2975272c72300804901e755aefeab731d5e15c2dd0c14bf4cc68565cc494536
                  • Instruction ID: 88b56ed946b99675370731443579efe425d4c7d82b1308ca52d482ace388990f
                  • Opcode Fuzzy Hash: e2975272c72300804901e755aefeab731d5e15c2dd0c14bf4cc68565cc494536
                  • Instruction Fuzzy Hash: EBC15A70D0430ADFCB54CFA5D4814AEFBBAFF85314B25C56AC455AB618D734AA82CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f02a0fb393c28cc72fa5317da4a254bb615278e6ca5d49ca5c148a836d92665
                  • Instruction ID: a4d35fc1fa9b2fc0d1fb5c9d9b0bc8e1867516ec8cb2ca10aa213e8e53c5eec3
                  • Opcode Fuzzy Hash: 2f02a0fb393c28cc72fa5317da4a254bb615278e6ca5d49ca5c148a836d92665
                  • Instruction Fuzzy Hash: 8CB1D0B4E052198FDB08CFA9C9849EEBBFABF89304F208529D805BB358D7359905CB54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e24a36237c84d91079c79efa3c3bb03355c37edcd942da1a6f38cf70590e6f5a
                  • Instruction ID: 326281f8872b7da9dc5de01133df87f7de475d776f8700ce286ed6c42122a7ad
                  • Opcode Fuzzy Hash: e24a36237c84d91079c79efa3c3bb03355c37edcd942da1a6f38cf70590e6f5a
                  • Instruction Fuzzy Hash: 8DB11B74E1121A8FCB54DFA9D890ADEBBB6FF88304F108529D405AB758DB30AD46CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eea455fc93be3af32d50168e046bd3e901d84dcaff08e917172498318aa2020d
                  • Instruction ID: 4d2f6fec9386a2645f8c41fe998f3e3ee2d58e038246904d487f87b236056d03
                  • Opcode Fuzzy Hash: eea455fc93be3af32d50168e046bd3e901d84dcaff08e917172498318aa2020d
                  • Instruction Fuzzy Hash: 04A116B0E0420ADBCB04CF96D4818AEFBBAFF89304F15D555D516AB618D7349A86CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9cdaadda505aa74124a444138496d597118da42923bc9d95dde948e3d1190346
                  • Instruction ID: 82f1a2755e9585f763b452b54cff7260d11ca21931fd95e35f16767e1090120a
                  • Opcode Fuzzy Hash: 9cdaadda505aa74124a444138496d597118da42923bc9d95dde948e3d1190346
                  • Instruction Fuzzy Hash: CE9138B0E0420ADFCB04CF96D4818AEFBBAFF89304B25D555C516AB618D734DA86CF94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 82abf2e24ee70f0dc02c3ef4352630b03b8dde81c3ef3f4b8d1a9f13aaebcaed
                  • Instruction ID: 1de104562ed5ec3f1b2c0f0cb88ee38e3adc4631a846e91e6540b3638df036e4
                  • Opcode Fuzzy Hash: 82abf2e24ee70f0dc02c3ef4352630b03b8dde81c3ef3f4b8d1a9f13aaebcaed
                  • Instruction Fuzzy Hash: 09314B71D0A7858FD71ACF76984169ABFF3AFC6304F09C0AAD444EA26AE7340846CB51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2a0bd64b8bb96fcbd0c644413ce4742282dd3c90f4e0aea97602905696f561eb
                  • Instruction ID: 174b8611a5ba0f1f67a0b0f60685a6ad517e1f6049759dfb9ef1566154fc3f7c
                  • Opcode Fuzzy Hash: 2a0bd64b8bb96fcbd0c644413ce4742282dd3c90f4e0aea97602905696f561eb
                  • Instruction Fuzzy Hash: EB8149B0E1420ADFCB04CF95D4818AEFBBAFF89304B25D555C516AB608D734EA86CF94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 910b2a5ac0034b373a7e9e9bd7d2079e57c2a141b7d719a0aeee61d6636f5b4c
                  • Instruction ID: e3180b7e6ee98c2ee6b3900080c74210c90ca467a80d622ceadb6a35298c739f
                  • Opcode Fuzzy Hash: 910b2a5ac0034b373a7e9e9bd7d2079e57c2a141b7d719a0aeee61d6636f5b4c
                  • Instruction Fuzzy Hash: A58148B0E0420ADFCB04CF95D4818AEFBBAFF89304B25D555C516AB608D734DA86CF94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 95dd5379c5ea0f9a6b04328b689fc894dc6a40c59892db3f59a3365ef24496ba
                  • Instruction ID: 66471f995bc24952b684bfa33ee2dfb7a017efb160407a7db328646050c01a40
                  • Opcode Fuzzy Hash: 95dd5379c5ea0f9a6b04328b689fc894dc6a40c59892db3f59a3365ef24496ba
                  • Instruction Fuzzy Hash: 618148B0E1420ADFCB04CF95D4818AEFBBAFF89304B25D555C516AB618D734EA86CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 681b0bb715dd44ac651fbee5b4a43168a326680b61a54b3e7da48f3a347a95ac
                  • Instruction ID: bd80be6eeaa48963807bc67b5c73724ddeef3b70c4b479ec4dad7caab4cb90ff
                  • Opcode Fuzzy Hash: 681b0bb715dd44ac651fbee5b4a43168a326680b61a54b3e7da48f3a347a95ac
                  • Instruction Fuzzy Hash: 95712474E0120ADFCB04CF99D5809EEFBBAFB89314F15D42AD915AB218D334A941CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2946d0f53768b32693f738c184eea64d60d7382d3ddde5f09e013fe1d67fd32d
                  • Instruction ID: aa3772305da754a2d142cbc778bf5b75ecffaf339f647a0e28ffc1c634425ea0
                  • Opcode Fuzzy Hash: 2946d0f53768b32693f738c184eea64d60d7382d3ddde5f09e013fe1d67fd32d
                  • Instruction Fuzzy Hash: CA31D671E006188BEB18CFABD8443DEFBB6AFC9314F14C16AD409AA268DB351A45CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2eaa10db56997daea667f5e8267dc60812ae241f7cf66d41510e78d3f39b1560
                  • Instruction ID: 561b0361489e31e38aa9c0aa1f552e5619e5ae5fda30c43c88d8245263fa9aee
                  • Opcode Fuzzy Hash: 2eaa10db56997daea667f5e8267dc60812ae241f7cf66d41510e78d3f39b1560
                  • Instruction Fuzzy Hash: BE11DD71E016199BEB2CCFABD9446DEFAF7BFC8304F04C175D918A6218EB3045419E50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • LoadLibraryA.KERNELBASE(?,00000000,00000002,?,02EC76B5,00000000), ref: 02EC79F5
                  • VirtualProtect.KERNELBASE(00000000,0000000C,00000040,?,?,02EC76B5,00000000), ref: 02EC7A35
                  • VirtualProtect.KERNELBASE(00000000,0000000C,?,?), ref: 02EC7A68
                  • VirtualProtect.KERNELBASE(00000000,004014A4,00000040,?), ref: 02EC7A93
                  • VirtualProtect.KERNELBASE(00000000,004014A4,?,?), ref: 02EC7ABD
                  Memory Dump Source
                  • Source File: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2eb0000_DCwTjs2dTP.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProtectVirtual$LibraryLoad
                  • String ID:
                  • API String ID: 895956442-0
                  • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                  • Instruction ID: e97f5128f4928262a86e90a835053c18eef8a3c3d16d400714865687cded975e
                  • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                  • Instruction Fuzzy Hash: 6F21C57224430A7FD7209AB48D48E7BBBECEB84304B18983DBE47D1455EB65E6068B60
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • VirtualProtect.KERNELBASE(00000000,000016CC,00000040,?), ref: 02EC7B1B
                  • VirtualProtect.KERNELBASE(00000000,000016CC,?,?), ref: 02EC7B4E
                  • VirtualProtect.KERNELBASE(00000000,00402AD1,00000040,?), ref: 02EC7B79
                  • VirtualProtect.KERNELBASE(00000000,00402AD1,?,?), ref: 02EC7BA3
                  Memory Dump Source
                  • Source File: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2eb0000_DCwTjs2dTP.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                  • Instruction ID: 0cd09961cf2c847272a88236c046d802a2e95b9fb6819e5217b35a0b6136c254
                  • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                  • Instruction Fuzzy Hash: E121C8722447096FD320AAA1CE8CE7BB7EDEB84314B14583DBE97D2441EB74E5168E30
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 45 2ec7537-2ec7576 call 2ec9028 * 2 50 2ec757c-2ec757e 45->50 51 2ec7791 45->51 50->51 53 2ec7584-2ec7595 VirtualAlloc 50->53 52 2ec7794-2ec779b 51->52 53->51 54 2ec759b-2ec75e9 call 2ec92bb call 2ec92df call 2ec91ba call 2ec9095 53->54 63 2ec773e-2ec774a 54->63 64 2ec75ef-2ec75f5 54->64 66 2ec774c-2ec7754 63->66 67 2ec777a-2ec778f call 2ec92df 63->67 64->63 65 2ec75fb-2ec7615 call 2ec9028 64->65 65->51 75 2ec761b-2ec7623 65->75 66->67 70 2ec7756-2ec7773 call 2ec92df 66->70 67->52 70->67 77 2ec763b-2ec7641 75->77 78 2ec7625 75->78 81 2ec7677-2ec7682 77->81 82 2ec7643-2ec7646 77->82 80 2ec762b-2ec7639 LoadLibraryA 78->80 80->77 80->80 83 2ec7699-2ec76a2 81->83 84 2ec7684-2ec768d call 2ec7bb3 81->84 85 2ec7649-2ec7662 call 2ec9028 82->85 88 2ec76a4 83->88 89 2ec76a6-2ec76ad 83->89 95 2ec773a 84->95 98 2ec7693 84->98 94 2ec7668-2ec7675 85->94 85->95 88->89 92 2ec76af-2ec76b8 call 2ec79e7 89->92 93 2ec76d5-2ec76d8 89->93 106 2ec76ba-2ec76c0 92->106 107 2ec76c2-2ec76c3 call 2ec7acd 92->107 96 2ec76da-2ec76dd 93->96 97 2ec7733-2ec7734 call 2ec88ca 93->97 94->81 94->85 95->63 96->97 100 2ec76df-2ec76e2 96->100 105 2ec7739 97->105 98->83 103 2ec76e4-2ec76e6 100->103 104 2ec7707-2ec7716 call 2ec83f9 100->104 103->104 110 2ec76e8-2ec76eb 103->110 116 2ec7718-2ec771e call 2ec8604 104->116 117 2ec7725-2ec7731 call 2ec7f8d 104->117 105->95 106->95 106->107 111 2ec76c8-2ec76cb 107->111 113 2ec76ed-2ec76f0 110->113 114 2ec76ff-2ec7705 call 2ec8d51 110->114 111->93 115 2ec76cd-2ec76d3 111->115 113->114 118 2ec76f2-2ec76f5 113->118 114->105 115->93 115->95 124 2ec7723-2ec7724 116->124 117->105 118->95 122 2ec76f7-2ec76fd call 2ec8ee2 118->122 122->105 124->117
                  APIs
                  • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 02EC758F
                  • LoadLibraryA.KERNELBASE(00000238), ref: 02EC762C
                  Memory Dump Source
                  • Source File: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2eb0000_DCwTjs2dTP.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocLibraryLoadVirtual
                  • String ID:
                  • API String ID: 3550616410-0
                  • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                  • Instruction ID: 2b6e6f1ef7340955a4f3f08b6c665e366483194e034cd433e506c73ad372988a
                  • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                  • Instruction Fuzzy Hash: B361B632480B06ABCB32AAE48E80BABF7ADFF05319F24A42DF55945540D735F162CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 128 2ec83f9-2ec8419 129 2ec841e-2ec842a 128->129 130 2ec841b 128->130 131 2ec85f5-2ec85f7 129->131 132 2ec8430-2ec8443 129->132 130->129 133 2ec85fd-2ec8602 131->133 134 2ec84a8-2ec84b3 131->134 138 2ec8449-2ec8462 132->138 139 2ec85d2 132->139 135 2ec85c2-2ec85c9 133->135 140 2ec85be 134->140 141 2ec84b9-2ec84e1 134->141 144 2ec8468-2ec8477 138->144 145 2ec85ca 138->145 143 2ec85d9 139->143 140->135 141->140 154 2ec84e7-2ec8503 141->154 147 2ec85db-2ec85ee 143->147 144->143 150 2ec847d-2ec8482 144->150 145->139 147->131 152 2ec849e-2ec84a2 150->152 153 2ec8484-2ec849a 150->153 152->134 152->147 153->152 154->140 156 2ec8509-2ec8528 SafeArrayCreate 154->156 156->140 157 2ec852e-2ec853b 156->157 158 2ec853d 157->158 159 2ec856a-2ec8573 157->159 160 2ec853f-2ec8545 158->160 161 2ec8547 158->161 173 2ec8575 call 130d040 159->173 174 2ec8575 call 130d041 159->174 160->159 160->161 163 2ec8549-2ec855a 161->163 162 2ec857b-2ec8591 164 2ec85ba-2ec85bb SafeArrayDestroy 162->164 165 2ec8593 162->165 163->163 166 2ec855c 163->166 164->140 167 2ec859d-2ec85ae 165->167 168 2ec8595-2ec859b 165->168 169 2ec855e-2ec8564 166->169 170 2ec8566 166->170 167->167 171 2ec85b0 167->171 168->164 168->167 169->163 169->170 170->159 171->164 172 2ec85b2-2ec85b8 171->172 172->164 172->167 173->162 174->162
                  APIs
                  • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 02EC8521
                  • SafeArrayDestroy.OLEAUT32(00000000), ref: 02EC85BB
                  Memory Dump Source
                  • Source File: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2eb0000_DCwTjs2dTP.jbxd
                  Yara matches
                  Similarity
                  • API ID: ArraySafe$CreateDestroy
                  • String ID:
                  • API String ID: 2156726103-0
                  • Opcode ID: 13055a546d3acc03fdeffe086f9be721a6484159b398ff6ac3d898ad76acf673
                  • Instruction ID: d64d213f9ae8ece0a57fd4a68c8af75ce1d8051ea57b71adaee5a914317deb55
                  • Opcode Fuzzy Hash: 13055a546d3acc03fdeffe086f9be721a6484159b398ff6ac3d898ad76acf673
                  • Instruction Fuzzy Hash: 45618FB12402469FC721CF60CA80EEA77EAFF88705F24956DED49CB205D770E646CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 396 1368489-136848d 397 13684c0-1368541 VirtualAlloc 396->397 398 136848f-13684bd 396->398 400 1368543-1368549 397->400 401 136854a-136858a 397->401 398->397 400->401
                  APIs
                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 01368531
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 8f5f8314e2adcbe31ed4f332e21e2f16f700a53aff0b781c72605d1832db69b7
                  • Instruction ID: d86756a08e32767fa5c3d6c9ff3959854757fbd68413dee63ef625c02833d98f
                  • Opcode Fuzzy Hash: 8f5f8314e2adcbe31ed4f332e21e2f16f700a53aff0b781c72605d1832db69b7
                  • Instruction Fuzzy Hash: 1531A8B9D002589FCF01CFA9D980AEEFBB4BB09314F14906AE814B7311D334A946CF64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 405 1368490-1368541 VirtualAlloc 407 1368543-1368549 405->407 408 136854a-136858a 405->408 407->408
                  APIs
                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 01368531
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: ae75d0744de455b50cf1b485f391df18f0bf51ec50bc8f7f4632fe329ca9105b
                  • Instruction ID: d0a5c63a6d65e80a209cebc390f0e94d3b585dd07b06c90095cfd35d3794b8dc
                  • Opcode Fuzzy Hash: ae75d0744de455b50cf1b485f391df18f0bf51ec50bc8f7f4632fe329ca9105b
                  • Instruction Fuzzy Hash: CE3173B9D002589FCF10CFA9E984ADEFBB4BB09314F10902AE819B7714D774A946CF65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.523853291.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_130d000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b0fe81fde843e750b7311df333415288c67fb4dc05486ed8fe6a4518a3ade5d3
                  • Instruction ID: 570e650ca89a3262c0f502fd33a22e661dde7287334a392b2d09e9b0f204bcd5
                  • Opcode Fuzzy Hash: b0fe81fde843e750b7311df333415288c67fb4dc05486ed8fe6a4518a3ade5d3
                  • Instruction Fuzzy Hash: 5121F571504244DFDB06DF98D9D0B26BFE5FB8832CF248569EC090BA96C336D856C7A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.523853291.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_130d000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 50e204321707f87e5eac1d9f24be47fa756d00b0de652189136428346da35c74
                  • Instruction ID: 7a24d1ca802ecf8dbabbb23163f36ea45e8dd0563610a4dbddb81d6f258db785
                  • Opcode Fuzzy Hash: 50e204321707f87e5eac1d9f24be47fa756d00b0de652189136428346da35c74
                  • Instruction Fuzzy Hash: 29210375504248DFDB06CF94DDD0B26BFE5FB88728F248569E8090BA86C336D856CAA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.523853291.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_130d000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction ID: 105bd834de4d4a95c324e688d8f9f23897cbd6f99b39a3214d38eca17437f1dd
                  • Opcode Fuzzy Hash: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction Fuzzy Hash: 6B11D376404280CFCB16CF94D9D4B16BFB1FB84324F24C6A9D8484B657C336D456CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.523853291.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_130d000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction ID: 04d94651d01ffabea4d46387b4711c2b7c544306a44d07cf3048f1a47018eee4
                  • Opcode Fuzzy Hash: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction Fuzzy Hash: C011D376404284DFCB12CF94D9C4B16BFB1FB84328F2886A9D8090B657C33AD456CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.523853291.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_130d000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9fc3d5f7185e147d797a2bbd6b329a12f3a5e29ca692da46a06b27de7c5f17d0
                  • Instruction ID: 4041ba978e6f7c6e0f3b6f9be5f4a81169dd12c7ed465eae8a48a5a3f9714311
                  • Opcode Fuzzy Hash: 9fc3d5f7185e147d797a2bbd6b329a12f3a5e29ca692da46a06b27de7c5f17d0
                  • Instruction Fuzzy Hash: 370128710043849BE7128A95CD84767FFD8EF412ACF08811AED094AA83D3749845C6B1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.523853291.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_130d000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7390b1968f2ce12b3aa6696e71efc5ed2a2bce77c13168a34e5a013ae7897d81
                  • Instruction ID: aef0a4eaba5875171d4e34a96de9ea22ddecff2c9c56843afbf719a2ca605e31
                  • Opcode Fuzzy Hash: 7390b1968f2ce12b3aa6696e71efc5ed2a2bce77c13168a34e5a013ae7897d81
                  • Instruction Fuzzy Hash: 7AF0C2714043849FE7118B59CC84B63FFE8EF41678F18C46AED085B687C379A844CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1nz2$1nz2
                  • API String ID: 0-940600227
                  • Opcode ID: 49911dea79bad9fb7136acaf6c47e415df3beeb9b77f6ed14e8a0d99e38af762
                  • Instruction ID: eed8a9c9080fb0644d006d9dc2158496f97bbb67155bd02ff952276892b5fa29
                  • Opcode Fuzzy Hash: 49911dea79bad9fb7136acaf6c47e415df3beeb9b77f6ed14e8a0d99e38af762
                  • Instruction Fuzzy Hash: E841F5B0D0420A9FCB48CFAAC5815EEFBF6BF89354F24C16AC415A7258D7349A45CFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1nz2$1nz2
                  • API String ID: 0-940600227
                  • Opcode ID: a151f2c47c59d7d98178dd6caed8e44cbc151aca4e9bc99a96dabad5a40d6e67
                  • Instruction ID: 4cff53eff43269005c450c757a42d84c6169d609be338a74e8907b6b4402d44b
                  • Opcode Fuzzy Hash: a151f2c47c59d7d98178dd6caed8e44cbc151aca4e9bc99a96dabad5a40d6e67
                  • Instruction Fuzzy Hash: C241C2B0D0460A9FCB48CFAAC5815EEFBF6BB88344F24D169C415B7258D7349A458FA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4diQ
                  • API String ID: 0-3112198810
                  • Opcode ID: aa978156bd07f392bc4a167f4fce86b2a7e95ca9e4e4893b4e2b6eb954e26514
                  • Instruction ID: cdc9bdec5b56bc70f504fd2dc63e26b1e235e5e6a2d5f63581fbeb4b6e1833af
                  • Opcode Fuzzy Hash: aa978156bd07f392bc4a167f4fce86b2a7e95ca9e4e4893b4e2b6eb954e26514
                  • Instruction Fuzzy Hash: 0B911C74E001698FDB14DFAAD880A9DFBF6BF89308F24C169D418AB319DB30A945CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4diQ
                  • API String ID: 0-3112198810
                  • Opcode ID: e771788e2dfb175cb3fb86e0e469161808abd0f2fd314e98187123dddb736dac
                  • Instruction ID: b04f123d88130431a2b57060c69a4c038941f55a53b1cfa69463228281fb6858
                  • Opcode Fuzzy Hash: e771788e2dfb175cb3fb86e0e469161808abd0f2fd314e98187123dddb736dac
                  • Instruction Fuzzy Hash: E6912C74E001698FDB14DF6AD880A9DFBF6BF88308F24C669D418AB319DB349946CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: x&QG
                  • API String ID: 0-4162311451
                  • Opcode ID: e33a16a3229d1e89be7c1779bdbcf9299ba79d893f80695f74269b1465606c53
                  • Instruction ID: 8982cc8079734650584ac4a5437992b4f99b8d3399d26baac54c1eae8a46cd8f
                  • Opcode Fuzzy Hash: e33a16a3229d1e89be7c1779bdbcf9299ba79d893f80695f74269b1465606c53
                  • Instruction Fuzzy Hash: 7451F2B0E05209CFCB08CFA9C5819EEFBF6FF89254F14956AD405B7328D7349A418BA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID: x&QG
                  • API String ID: 0-4162311451
                  • Opcode ID: 73c88b524a53d23c855a5b0e1be987b10940334184372449618b1af7410227a8
                  • Instruction ID: 3226ac6937838bff2fe3c99aa4f54a00de315aa7bb37028286db5fedb76d14a1
                  • Opcode Fuzzy Hash: 73c88b524a53d23c855a5b0e1be987b10940334184372449618b1af7410227a8
                  • Instruction Fuzzy Hash: 6E51E1B0E05219CFCB08CFAAD5819DEFBF6BB88254F24952AD515B7318D7309A418FA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6100f951673354c9b9a1a129e1d8978d216bd8e71489d6f3cf20b0de554950ea
                  • Instruction ID: 4c47ebf1f2c5c708fa4661218e50a9096944da812ddf7fb634f6350b677de66c
                  • Opcode Fuzzy Hash: 6100f951673354c9b9a1a129e1d8978d216bd8e71489d6f3cf20b0de554950ea
                  • Instruction Fuzzy Hash: E7810F74A1120ACFCB44CFA9C5848AEFBF5FF88354F248569D415AB728D730AA02CF95
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7489fc7543aaecf4a16b74897771824fef04b4857b391164479187ceddaa6b0f
                  • Instruction ID: e317d412ed3b7de19b4b726341699248b436b5f2dde2a528ce1eb47d30a27083
                  • Opcode Fuzzy Hash: 7489fc7543aaecf4a16b74897771824fef04b4857b391164479187ceddaa6b0f
                  • Instruction Fuzzy Hash: 2E810374A15209CFCB44CFA9C58489EFBF5FF88354F24856AD415AB728D730AA42CF91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4013b0b94b7acd3114b90147ab0c7c34b8e77898719a82bda0695854417c952e
                  • Instruction ID: 54cb294334628054757563bb9bec45e23efff8511a507b035462d7da182251de
                  • Opcode Fuzzy Hash: 4013b0b94b7acd3114b90147ab0c7c34b8e77898719a82bda0695854417c952e
                  • Instruction Fuzzy Hash: 7571D0B4E1420ADFCB04CF99C4808AEFBB9FF58394F14C569D415AB218D770A982CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c22811484f7c690eabf4ddb28c9d2e2203278e8a83bdb46a868d0149aceeac1c
                  • Instruction ID: 1583437fb147b3f9cc6e5a5a16c7b2d1eaf96709121c689f25e8975e70082cf3
                  • Opcode Fuzzy Hash: c22811484f7c690eabf4ddb28c9d2e2203278e8a83bdb46a868d0149aceeac1c
                  • Instruction Fuzzy Hash: B561F4B4D0424A9FCB04CFA9C4808AEFFB6FF89394F18C566D415A7619C774A982CF91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9acaeb61e2c4464653413fe7dd37ea2cbf965fda1ae35fcc6e9b50b4aa5d8b5f
                  • Instruction ID: 00b4777784b591d3fad989a6cbcafa6a4f4c36165659ca50c0a03f1502af62b0
                  • Opcode Fuzzy Hash: 9acaeb61e2c4464653413fe7dd37ea2cbf965fda1ae35fcc6e9b50b4aa5d8b5f
                  • Instruction Fuzzy Hash: 77515A71E053549FDB99CFA6C8506DAFBF2EF85310F18C0AED488A6225E7384A45CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f2dd9fcd9677b8dc71498b772e1621917ed6008b1d06e1e8a9bc784f8b5335cc
                  • Instruction ID: 4eee0bd6ec5d04c0771c8172a44669461264bbcf072d6eaf36156cc23bad51fc
                  • Opcode Fuzzy Hash: f2dd9fcd9677b8dc71498b772e1621917ed6008b1d06e1e8a9bc784f8b5335cc
                  • Instruction Fuzzy Hash: 67411BB0E0520ADFCB44CFAAD5415AEFBFAFF88350F24C56AC405A7218D7349A418F95
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.524349229.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1360000_DCwTjs2dTP.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 07aa6f4b2750d5d2335388806f7a8cf9ba3d0b0e13a083de890ea3eb21b8fd23
                  • Instruction ID: 3bd97779eb5d6d719799917728981dc1515311b930d158f5c0091c0d86f6879e
                  • Opcode Fuzzy Hash: 07aa6f4b2750d5d2335388806f7a8cf9ba3d0b0e13a083de890ea3eb21b8fd23
                  • Instruction Fuzzy Hash: FE41E7B0E0520ADBCB44CFAAD5415AEFBFAFF88350F24C56AC805B7618D7349A418B94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.525348826.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2eb0000_DCwTjs2dTP.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                  • Instruction ID: ab7f1e5bc5249684e36d2e0b764534d9bad9d7d9a342f9da6b3fc2242ad8bde7
                  • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                  • Instruction Fuzzy Hash: 5BF03932240114AFDF158F88CD42EBAB7E9EF08364B04806DFD09D7222E332ED219B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Execution Graph

                  Execution Coverage:14.8%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:3
                  Total number of Limit Nodes:0
                  execution_graph 32084 2938490 32085 29384d8 VirtualAlloc 32084->32085 32086 2938543 32085->32086
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: [-Gi$d
                  • API String ID: 0-338192110
                  • Opcode ID: 3c7fb1e778fb4895161b6e56576745ca4fe97089a214c6046b6f651d9b1eb095
                  • Instruction ID: 70e9ec86895b2c8b2c2ef23805a07490bde996a93e5aeed426646fea18e160ed
                  • Opcode Fuzzy Hash: 3c7fb1e778fb4895161b6e56576745ca4fe97089a214c6046b6f651d9b1eb095
                  • Instruction Fuzzy Hash: 99C23834A00214CFDB19DF65C894BA9B7B2FF88315F15819AE90A9B361DB35ED42CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f04dd0bd6725fbfa3f8b4e0025e3dcd0bccd805c117d0a87db406a55726556f4
                  • Instruction ID: 7f66e0540a12270021bebffff82c2ad849772ca5b15d42a77330d7ddfda08c21
                  • Opcode Fuzzy Hash: f04dd0bd6725fbfa3f8b4e0025e3dcd0bccd805c117d0a87db406a55726556f4
                  • Instruction Fuzzy Hash: 62E15975600A049FD725CF79C884BDAB7E2FFC8315F148A68D4AA8B365DB70B845CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 df0630-df0658 1 df065e-df0662 0->1 2 df0a11-df0a38 0->2 3 df066c 1->3 4 df0664-df066a 1->4 11 df0a3f-df0a6b 2->11 5 df066f-df0671 3->5 4->5 7 df067f 5->7 8 df0673-df067d 5->8 9 df0684-df0686 7->9 8->9 9->11 12 df068c-df0690 9->12 15 df0a72-df0aa1 11->15 12->11 14 df0696-df069a 12->14 14->15 16 df06a0-df06a4 14->16 24 df0aa8-df0ad4 15->24 16->15 19 df06aa-df06ae 16->19 19->15 22 df06b4-df06b8 19->22 23 df06be-df06c2 22->23 22->24 27 df0adb-df0b07 23->27 28 df06c8-df06cc 23->28 24->27 29 df0b0e-df0b4e 27->29 28->29 30 df06d2-df06f4 28->30 44 df06fe 30->44 45 df06f6-df06fc 30->45 46 df0705-df070c 44->46 45->46 50 df072e 46->50 51 df070e 46->51 64 df0735-df0739 50->64 52 df08af-df08b5 51->52 53 df087e-df0883 51->53 54 df071c-df0723 51->54 55 df088c-df0891 51->55 56 df089a-df089f 51->56 57 df08a8-df08ad 51->57 58 df0877-df087c 51->58 59 df0715-df071a 51->59 60 df0725-df072c 51->60 61 df0885-df088a 51->61 62 df0893-df0898 51->62 63 df08a1-df08a6 51->63 66 df08b7-df08bd 52->66 53->66 54->64 55->66 56->66 57->66 58->66 59->64 60->64 61->66 62->66 63->66 67 df073b-df0741 64->67 68 df0743 64->68 70 df08bf-df08c5 66->70 71 df08c7-df08f9 66->71 69 df0746-df074a 67->69 68->69 73 df074c-df0750 69->73 74 df0765-df0769 69->74 70->71 75 df0900-df0923 70->75 71->75 76 df075a 73->76 77 df0752-df0758 73->77 79 df076b-df0771 74->79 80 df0773 74->80 105 df092a-df0947 75->105 81 df075d-df0762 76->81 77->81 82 df0776-df077a 79->82 80->82 81->74 85 df077c-df0780 82->85 86 df0795-df0799 82->86 91 df078a 85->91 92 df0782-df0788 85->92 88 df079b-df07a1 86->88 89 df07a3 86->89 93 df07a6-df07aa 88->93 89->93 95 df078d-df0792 91->95 92->95 97 df07ac-df07b0 93->97 98 df07c5-df07c9 93->98 95->86 100 df07ba 97->100 101 df07b2-df07b8 97->101 103 df07cb-df07d1 98->103 104 df07d3 98->104 106 df07bd-df07c2 100->106 101->106 107 df07d6-df07da 103->107 104->107 111 df0949-df094c 105->111 112 df0954-df095c 105->112 106->98 109 df07dc-df07e0 107->109 110 df07f5-df0812 call df0bd8 107->110 114 df07ea 109->114 115 df07e2-df07e8 109->115 126 df0818-df081a 110->126 111->112 118 df095e-df0961 112->118 119 df0969-df0971 112->119 116 df07ed-df07f2 114->116 115->116 116->110 118->119 120 df097e-df0986 119->120 121 df0973-df0976 119->121 124 df0988-df098b 120->124 125 df0993 120->125 121->120 124->125 125->2 126->105 127 df0820-df0825 126->127 127->66 128 df082b-df0841 127->128 129 df084a-df084d 128->129 130 df0843 128->130 131 df084f 129->131 132 df0856-df0862 129->132 130->132 133 df0845-df0848 130->133 131->52 131->53 131->55 131->56 131->57 131->58 131->61 131->62 131->63 131->132 134 df086b-df086e 132->134 135 df0864 132->135 133->129 133->132 134->52 137 df0870 134->137 135->52 136 df0866-df0869 135->136 136->52 136->134 137->52 137->56 137->57 137->58 137->62 137->63
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: `b{$`b{$`b{$`b{$`b{$`b{
                  • API String ID: 0-1368957477
                  • Opcode ID: 9eea90d51ad4460a857add001b73bfadb8892e0d55fc4b164f966105a6943c45
                  • Instruction ID: 99a6794ad770d6ca3a754a264d808fc266a35a93170cf5489f359dc4cf623033
                  • Opcode Fuzzy Hash: 9eea90d51ad4460a857add001b73bfadb8892e0d55fc4b164f966105a6943c45
                  • Instruction Fuzzy Hash: 3FD1A530B006089FDB24AB34D06477EBAE2FB84344F16C569D1469B792EF74EC85CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 530 4b36ef8-4b36f04 531 4b36f06-4b36f0d 530->531 532 4b36f64-4b36fe9 530->532 533 4b36f59-4b36f5b 531->533 534 4b36f0f-4b36f11 531->534 554 4b36feb-4b36fee 532->554 555 4b36ffd-4b37001 532->555 535 4b36f39-4b36f3e 533->535 536 4b36f5d-4b36f63 533->536 534->536 537 4b36f13-4b36f18 534->537 539 4b36f40-4b36f4c 535->539 540 4b36f56 535->540 541 4b36f30-4b36f35 537->541 542 4b36f1a-4b36f26 537->542 539->540 548 4b36f4e-4b36f55 539->548 540->533 541->537 543 4b36f37 541->543 542->541 549 4b36f28-4b36f2f 542->549 543->536 571 4b36ff1 call 4b37090 554->571 572 4b36ff1 call 4b37080 554->572 556 4b37003-4b3700a 555->556 557 4b3700b-4b37057 call 4b3579c 555->557 567 4b37061-4b3707e 557->567 568 4b37059-4b37060 557->568 558 4b36ff7-4b36ffc 571->558 572->558
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: `b{$`b{
                  • API String ID: 0-259702225
                  • Opcode ID: 6b0bfdf1b598cf29933e821c91bee0072670065a293a2bd5078d4c9f02e5a5f4
                  • Instruction ID: 2c2599814f4485bc095e4347b7d1c9acbabe06297d98e91bc2fb19612b5a2a0f
                  • Opcode Fuzzy Hash: 6b0bfdf1b598cf29933e821c91bee0072670065a293a2bd5078d4c9f02e5a5f4
                  • Instruction Fuzzy Hash: F241B031B00214DFCB24DBBAD4506EEB7F5EF88625B1480AAE91DDB750DB30AD028B91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 604 4b3d190-4b3d195 605 4b3d197-4b3d1a6 604->605 606 4b3d42f-4b3d46a 605->606 607 4b3d1ac-4b3d1b4 605->607 614 4b3d488-4b3d4b7 606->614 615 4b3d46c-4b3d481 606->615 608 4b3d377-4b3d381 607->608 609 4b3d1ba-4b3d1bd 607->609 608->605 621 4b3d387-4b3d38c 608->621 610 4b3d1c3-4b3d1c9 609->610 611 4b3d391-4b3d397 609->611 610->606 613 4b3d1cf-4b3d1d7 610->613 617 4b3d3b0-4b3d3b9 call 4b39458 611->617 618 4b3d399 611->618 619 4b3d20b-4b3d218 613->619 620 4b3d1d9-4b3d1dc 613->620 628 4b3d4bf-4b3d4c1 614->628 634 4b3d483 615->634 617->605 631 4b3d3bf-4b3d3cb 617->631 753 4b3d39b call 4b3d190 618->753 754 4b3d39b call 4b3d18a 618->754 619->617 630 4b3d21e-4b3d221 619->630 624 4b3d1e2-4b3d1e5 620->624 625 4b3d33a-4b3d342 620->625 627 4b3d426-4b3d42e 621->627 632 4b3d354-4b3d35d 624->632 633 4b3d1eb-4b3d1ff 624->633 639 4b3d34a-4b3d34f 625->639 635 4b3d4c3-4b3d4c9 628->635 636 4b3d52e-4b3d535 628->636 629 4b3d3a1-4b3d3a3 629->605 637 4b3d3a9-4b3d3ae 629->637 630->606 638 4b3d227-4b3d22f 630->638 640 4b3d3d5-4b3d3dc 631->640 641 4b3d3cd 631->641 632->617 642 4b3d35f-4b3d368 call 4b3c798 632->642 633->605 675 4b3d201-4b3d206 633->675 643 4b3d7a2-4b3d7a9 634->643 635->643 646 4b3d4cf-4b3d4d5 635->646 644 4b3d53b-4b3d543 636->644 645 4b3d609-4b3d60d 636->645 637->627 647 4b3d282-4b3d285 638->647 648 4b3d231-4b3d237 638->648 639->627 653 4b3d404-4b3d413 640->653 654 4b3d3de-4b3d3e5 640->654 641->640 666 4b3d36d-4b3d372 642->666 650 4b3d7c6-4b3d7cd 643->650 651 4b3d7ab-4b3d7c4 643->651 660 4b3d545-4b3d558 644->660 661 4b3d55f-4b3d574 644->661 655 4b3d60f-4b3d669 call 4b38730 645->655 656 4b3d66e-4b3d676 645->656 662 4b3d4d7-4b3d4dc 646->662 663 4b3d4de-4b3d4e5 call 4b3c1e8 646->663 657 4b3d287-4b3d293 647->657 658 4b3d2e6-4b3d303 647->658 648->606 649 4b3d23d-4b3d243 648->649 664 4b3d266-4b3d27d 649->664 665 4b3d245-4b3d256 call 4b3c228 649->665 667 4b3d7ea 650->667 668 4b3d7cf-4b3d7e8 650->668 680 4b3d7ec-4b3d7f8 651->680 653->605 696 4b3d419-4b3d421 653->696 672 4b3d3e7-4b3d3ee 654->672 673 4b3d3fc 654->673 655->680 676 4b3d692-4b3d6af 656->676 677 4b3d678-4b3d68b 656->677 657->617 669 4b3d299-4b3d2aa call 4b3af80 657->669 714 4b3d305-4b3d319 658->714 715 4b3d31e-4b3d338 658->715 660->661 661->644 690 4b3d576-4b3d57e 661->690 670 4b3d4e7-4b3d4e9 662->670 663->670 664->617 665->605 701 4b3d25c-4b3d261 665->701 666->627 667->680 668->680 702 4b3d2cb-4b3d2e1 669->702 703 4b3d2ac-4b3d2c6 call 4b3c290 669->703 670->643 683 4b3d4ef-4b3d529 call 4b38730 670->683 672->673 685 4b3d3f0-4b3d3fa 672->685 673->653 675->627 697 4b3d6b1-4b3d6c4 676->697 698 4b3d6cb-4b3d6cd 676->698 677->676 683->680 685->627 699 4b3d580-4b3d593 690->699 700 4b3d59a-4b3d5a0 690->700 696->627 697->698 709 4b3d6e5-4b3d6f3 698->709 710 4b3d6cf-4b3d6d3 698->710 699->700 711 4b3d5a2-4b3d5a7 700->711 712 4b3d5a9-4b3d5b0 call 4b3c1e8 700->712 701->627 702->617 703->627 719 4b3d6f5-4b3d6fc 709->719 720 4b3d6fe-4b3d704 709->720 710->709 716 4b3d6d5-4b3d6e3 710->716 717 4b3d5b2-4b3d5b4 711->717 712->717 714->617 715->617 716->676 716->709 726 4b3d5c7-4b3d604 call 4b38730 717->726 727 4b3d5b6-4b3d5c2 717->727 725 4b3d717-4b3d71b 719->725 728 4b3d706-4b3d70b 720->728 729 4b3d70d-4b3d70f call 4b3c1e8 720->729 734 4b3d746-4b3d783 call 4b38730 725->734 735 4b3d71d-4b3d72b 725->735 726->680 727->643 732 4b3d714 728->732 729->732 732->725 751 4b3d785-4b3d791 734->751 752 4b3d79b-4b3d7a0 734->752 735->643 742 4b3d72d-4b3d742 735->742 747 4b3d744 742->747 747->643 751->752 752->680 753->629 754->629
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: 5074cc16ad74b0bbe856e55347a86ef3d647b7bb3da6adc4447ab232c8cf5d3a
                  • Instruction ID: 54a316cb81bb4a501fa8f18f260956929cc2462eb1fc06df6e417ffed71c4e1c
                  • Opcode Fuzzy Hash: 5074cc16ad74b0bbe856e55347a86ef3d647b7bb3da6adc4447ab232c8cf5d3a
                  • Instruction Fuzzy Hash: CF126675A00605CFDB21CFAAC584AAEB7FAFF88305F10495AD45AD7240DB34F882CB81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 755 df0620-df0658 757 df065e-df0662 755->757 758 df0a11-df0a38 755->758 759 df066c 757->759 760 df0664-df066a 757->760 767 df0a3f-df0a6b 758->767 761 df066f-df0671 759->761 760->761 763 df067f 761->763 764 df0673-df067d 761->764 765 df0684-df0686 763->765 764->765 765->767 768 df068c-df0690 765->768 771 df0a72-df0aa1 767->771 768->767 770 df0696-df069a 768->770 770->771 772 df06a0-df06a4 770->772 780 df0aa8-df0ad4 771->780 772->771 775 df06aa-df06ae 772->775 775->771 778 df06b4-df06b8 775->778 779 df06be-df06c2 778->779 778->780 783 df0adb-df0b07 779->783 784 df06c8-df06cc 779->784 780->783 785 df0b0e-df0b4e 783->785 784->785 786 df06d2-df06f4 784->786 800 df06fe 786->800 801 df06f6-df06fc 786->801 802 df0705-df070c 800->802 801->802 806 df072e 802->806 807 df070e 802->807 820 df0735-df0739 806->820 808 df08af-df08b5 807->808 809 df087e-df0883 807->809 810 df071c-df0723 807->810 811 df088c-df0891 807->811 812 df089a-df089f 807->812 813 df08a8-df08ad 807->813 814 df0877-df087c 807->814 815 df0715-df071a 807->815 816 df0725-df072c 807->816 817 df0885-df088a 807->817 818 df0893-df0898 807->818 819 df08a1-df08a6 807->819 822 df08b7-df08bd 808->822 809->822 810->820 811->822 812->822 813->822 814->822 815->820 816->820 817->822 818->822 819->822 823 df073b-df0741 820->823 824 df0743 820->824 826 df08bf-df08c5 822->826 827 df08c7-df08f9 822->827 825 df0746-df074a 823->825 824->825 829 df074c-df0750 825->829 830 df0765-df0769 825->830 826->827 831 df0900-df0923 826->831 827->831 832 df075a 829->832 833 df0752-df0758 829->833 835 df076b-df0771 830->835 836 df0773 830->836 861 df092a-df0947 831->861 837 df075d-df0762 832->837 833->837 838 df0776-df077a 835->838 836->838 837->830 841 df077c-df0780 838->841 842 df0795-df0799 838->842 847 df078a 841->847 848 df0782-df0788 841->848 844 df079b-df07a1 842->844 845 df07a3 842->845 849 df07a6-df07aa 844->849 845->849 851 df078d-df0792 847->851 848->851 853 df07ac-df07b0 849->853 854 df07c5-df07c9 849->854 851->842 856 df07ba 853->856 857 df07b2-df07b8 853->857 859 df07cb-df07d1 854->859 860 df07d3 854->860 862 df07bd-df07c2 856->862 857->862 863 df07d6-df07da 859->863 860->863 867 df0949-df094c 861->867 868 df0954-df095c 861->868 862->854 865 df07dc-df07e0 863->865 866 df07f5-df0812 call df0bd8 863->866 870 df07ea 865->870 871 df07e2-df07e8 865->871 882 df0818-df081a 866->882 867->868 874 df095e-df0961 868->874 875 df0969-df0971 868->875 872 df07ed-df07f2 870->872 871->872 872->866 874->875 876 df097e-df0986 875->876 877 df0973-df0976 875->877 880 df0988-df098b 876->880 881 df0993 876->881 877->876 880->881 881->758 882->861 883 df0820-df0825 882->883 883->822 884 df082b-df0841 883->884 885 df084a-df084d 884->885 886 df0843 884->886 887 df084f 885->887 888 df0856-df0862 885->888 886->888 889 df0845-df0848 886->889 887->808 887->809 887->811 887->812 887->813 887->814 887->817 887->818 887->819 887->888 890 df086b-df086e 888->890 891 df0864 888->891 889->885 889->888 890->808 893 df0870 890->893 891->808 892 df0866-df0869 891->892 892->808 892->890 893->808 893->812 893->813 893->814 893->818 893->819
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: `b{
                  • API String ID: 0-2100264562
                  • Opcode ID: bed7838c1734505fc018d6b1193774e8a362cf1bb8994cadb2b8e6855ef1bed9
                  • Instruction ID: ad9ec57096ca4237da1c7d4c17dc130463d5d2e4e3529f6a0f2310094777997b
                  • Opcode Fuzzy Hash: bed7838c1734505fc018d6b1193774e8a362cf1bb8994cadb2b8e6855ef1bed9
                  • Instruction Fuzzy Hash: 9E919130A00608DFEB24AF24C054B7ABBF1FB44314F1AC55AD2568B696DB74EC85CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 948 2938489-2938541 VirtualAlloc 951 2938543-2938549 948->951 952 293854a-293858a 948->952 951->952
                  APIs
                  • VirtualAlloc.KERNEL32(?,?,?,?), ref: 02938531
                  Memory Dump Source
                  • Source File: 0000000A.00000002.525388519.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2930000_sihost.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 9c0e7c9b307d4030fb22eee532eea2f6f8f3fc9d77a17c80b9024cacfa4515e8
                  • Instruction ID: 357d229c55fa05fb211d133d78a6f6a6818375e79b62aa74b69e0f06b8fb27a4
                  • Opcode Fuzzy Hash: 9c0e7c9b307d4030fb22eee532eea2f6f8f3fc9d77a17c80b9024cacfa4515e8
                  • Instruction Fuzzy Hash: 1A71ABB8E05219DFCF05CFA9D984AEEBBB1BB49310F14942AE815B7310D734A905CFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1082 df04c8-df04db 1084 df04dd-df050c 1082->1084 1085 df0514-df051c 1082->1085 1084->1085 1086 df051e-df0524 1085->1086 1087 df0526-df052a 1085->1087 1086->1087 1088 df052c-df0530 1087->1088 1089 df054a-df059d 1087->1089 1091 df053e-df0549 1088->1091 1092 df0532 1088->1092 1103 df059f-df05a6 1089->1103 1104 df05a8 1089->1104 1113 df0534 call df0630 1092->1113 1114 df0534 call df0620 1092->1114 1095 df0539-df053d 1105 df05ad-df05af 1103->1105 1104->1105 1106 df0617-df0619 1105->1106 1107 df05b1-df05b8 1105->1107 1108 df05dc-df0610 1107->1108 1109 df05ba-df05d6 1107->1109 1108->1106 1109->1108 1113->1095 1114->1095
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: `b{
                  • API String ID: 0-2100264562
                  • Opcode ID: 34dc654fbf604d71430c801c420574de5392fe2aa75b0e91bdbd3b64537fc36a
                  • Instruction ID: ae76a2d565cf8b46e720b11d673e97e3f376984e2eb0af0b087d023c57f7d18b
                  • Opcode Fuzzy Hash: 34dc654fbf604d71430c801c420574de5392fe2aa75b0e91bdbd3b64537fc36a
                  • Instruction Fuzzy Hash: F6310231304B544BD334E73AD4147ABBBD2AF85314F08886ED18A8B792EB75EC45CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1115 2938490-2938541 VirtualAlloc 1117 2938543-2938549 1115->1117 1118 293854a-293858a 1115->1118 1117->1118
                  APIs
                  • VirtualAlloc.KERNEL32(?,?,?,?), ref: 02938531
                  Memory Dump Source
                  • Source File: 0000000A.00000002.525388519.0000000002930000.00000040.00000800.00020000.00000000.sdmp, Offset: 02930000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2930000_sihost.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 4dfecad7caaedbbb57b99cad74b9e6a8878078d1b3ea3652213922f33b336e40
                  • Instruction ID: 982174f733d4863a6d6b9f462f2ab58e9b9871eb50243e06cbf87701f088b247
                  • Opcode Fuzzy Hash: 4dfecad7caaedbbb57b99cad74b9e6a8878078d1b3ea3652213922f33b336e40
                  • Instruction Fuzzy Hash: 013174B9D002589FCF10CFA9D984ADEFBB5BB09314F14902AE819B7310D774A946CF65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1122 df031f-df035e 1126 df0368-df03d4 1122->1126 1127 df0360-df0367 1122->1127 1136 df03f6-df0458 1126->1136 1137 df03d6-df03df 1126->1137 1147 df03e1 call df04c8 1137->1147 1148 df03e1 call df0461 1137->1148 1140 df03e6-df03e8 1142 df03ea-df03ef 1140->1142 1143 df03f0-df03f5 1140->1143 1147->1140 1148->1140
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: `b{
                  • API String ID: 0-2100264562
                  • Opcode ID: e9336a6417ec78152879fee859ded318aa54948f9f6263c63c8baee36f59ff56
                  • Instruction ID: abd85c9b53de53c2a6d2de3ce68cb927b3edbde94da9876ce5ba7641a9f83261
                  • Opcode Fuzzy Hash: e9336a6417ec78152879fee859ded318aa54948f9f6263c63c8baee36f59ff56
                  • Instruction Fuzzy Hash: 2C11E6223042580B9625637E68602FF6BCECFC6539B05017AE749DB782ED158C0643B5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1149 df0461-df0468 1150 df046a-df0475 1149->1150 1151 df04c8-df04db 1149->1151 1152 df0477-df0480 1150->1152 1153 df0481-df04c3 1150->1153 1155 df04dd-df050c 1151->1155 1156 df0514-df051c 1151->1156 1153->1151 1155->1156 1159 df051e-df0524 1156->1159 1160 df0526-df052a 1156->1160 1159->1160 1161 df052c-df0530 1160->1161 1162 df054a-df059d 1160->1162 1165 df053e-df0549 1161->1165 1166 df0532 1161->1166 1179 df059f-df05a6 1162->1179 1180 df05a8 1162->1180 1189 df0534 call df0630 1166->1189 1190 df0534 call df0620 1166->1190 1170 df0539-df053d 1181 df05ad-df05af 1179->1181 1180->1181 1182 df0617-df0619 1181->1182 1183 df05b1-df05b8 1181->1183 1184 df05dc-df0610 1183->1184 1185 df05ba-df05d6 1183->1185 1184->1182 1185->1184 1189->1170 1190->1170
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: `b{
                  • API String ID: 0-2100264562
                  • Opcode ID: 97d1d75e70febf7f157c9cdc028380820189682cd6ed850f469814ef95298a9d
                  • Instruction ID: 72d3ba79d90fbba86458fd64ffcecc8394a4d20648850b57992422d2ff28a9b5
                  • Opcode Fuzzy Hash: 97d1d75e70febf7f157c9cdc028380820189682cd6ed850f469814ef95298a9d
                  • Instruction Fuzzy Hash: 74210A612042444FD325E728D8607EABBD6EF81214F08846ED289CF792EB64EC45C7B6
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID: `b{
                  • API String ID: 0-2100264562
                  • Opcode ID: 7052664b236323fe77ac931484fdd2c651390345094cea5a09bd75eb9a26093f
                  • Instruction ID: daed6b5cc95d0015e3bef706a3ea69d4a1474b2554a5a1c025d8d0994237d442
                  • Opcode Fuzzy Hash: 7052664b236323fe77ac931484fdd2c651390345094cea5a09bd75eb9a26093f
                  • Instruction Fuzzy Hash: 3A01D6317042980FC71AA77999201AE3B969FC651931940FBC609CF353FF298C0B87A6
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 893a327c00d03bf51d4dfdacb0d562b5a2679b47e8a61b0fc51f37e6e054d09c
                  • Instruction ID: ad773bb5b502bd5256760d0c7dd2d83304c39c815ad3e1d21da7e5bf2f1b2f57
                  • Opcode Fuzzy Hash: 893a327c00d03bf51d4dfdacb0d562b5a2679b47e8a61b0fc51f37e6e054d09c
                  • Instruction Fuzzy Hash: B2624974A006148FCB25DF66C594BAEBBF6FF8C305F208599E49A97251EB34AC42CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7d4077f3d79bed006aa0ae2c2b876c244b912d508cea8765913389608cf27ea4
                  • Instruction ID: fdf881355e276c2ddbbc95d20ffccf48dd318825dd44bae681109d3ecb43781b
                  • Opcode Fuzzy Hash: 7d4077f3d79bed006aa0ae2c2b876c244b912d508cea8765913389608cf27ea4
                  • Instruction Fuzzy Hash: 2162E334A00214CFDB24DF69C958BA9B7B6EF48305F1484E9E50AAB361DB35ED82CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c8a3f442fb7b1904c26923242ba937bf369db70a771326aea7c7a7e93532139
                  • Instruction ID: 4e1416803c5a87c77d783bfbd35c25286e81791ed1bf43e699cdfedfadb3040d
                  • Opcode Fuzzy Hash: 3c8a3f442fb7b1904c26923242ba937bf369db70a771326aea7c7a7e93532139
                  • Instruction Fuzzy Hash: 6E029F75A002169FCB14DF69C484AAEBBB2FF88315F048699E8199B365D730FC56CBD0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 55947813d3c82bd1119a46bd2d51c72a1d26ab4fe9ebab72521357ca9d5224e4
                  • Instruction ID: 7984dfd57ddc7edb8e3bf779ab566829d01208d9126fba088838f81fc37d2fde
                  • Opcode Fuzzy Hash: 55947813d3c82bd1119a46bd2d51c72a1d26ab4fe9ebab72521357ca9d5224e4
                  • Instruction Fuzzy Hash: 2AD1AF707086108BD7259F7AC5947AAB7A6FB84306F00485AE45BDB256EB78FC42DB80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4edf35a455c1192b029f05b74a440c68956d482fdbb0b511866fdba9a11244bc
                  • Instruction ID: 4fe7b27f9d5c6c13ac74c1ab8e6bb2971009b1917b241d0df24f9c6d6ae3f95c
                  • Opcode Fuzzy Hash: 4edf35a455c1192b029f05b74a440c68956d482fdbb0b511866fdba9a11244bc
                  • Instruction Fuzzy Hash: 2DD13C34A01204DFDB24DFA5D998AADBBB2FF88306F548569E816DB350DB35AC46CF40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 846479652664ec138cd04dd4127f02e3d3716c4719b8eabf5d27409e30dbdf34
                  • Instruction ID: 5eabe695ba4d1c7912246d2f640fa0b534c974d51cd53126c2055c631046e0b9
                  • Opcode Fuzzy Hash: 846479652664ec138cd04dd4127f02e3d3716c4719b8eabf5d27409e30dbdf34
                  • Instruction Fuzzy Hash: 6BA10730B002059FDB14CF66D4406AEBBF6EF85315F2285E9E4199B641EB35FC46CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a5d4f1f57332e4e3cecc228acbbc98a3bef7f159a0077eed51bb4234c98c173c
                  • Instruction ID: 03f2dfd826cfbd6cafefe43721a55fcd99207ac9380201ae2cd3111c63fbeb56
                  • Opcode Fuzzy Hash: a5d4f1f57332e4e3cecc228acbbc98a3bef7f159a0077eed51bb4234c98c173c
                  • Instruction Fuzzy Hash: E9C1B8706006058FC714DF2AC584ADABBF2FF89315F148AA9E45A8B761E770FD06CB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: be14070b39803d9048aba849c407338accdc2a5f35d851a24b297d5a3d2f56e0
                  • Instruction ID: f2e0f08ba47501309c8858eb275e06660b05e36335c328c81d9c35d89db1db02
                  • Opcode Fuzzy Hash: be14070b39803d9048aba849c407338accdc2a5f35d851a24b297d5a3d2f56e0
                  • Instruction Fuzzy Hash: 10B14A74A002148FDB25DF65C494AAABBF2FF88305F208599D49A9B355EB34F846CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 87c0e88b5ea13b8790281be6d90c2fba3f0936068f40d0d6b84a5a2dcda2de8f
                  • Instruction ID: 7584b3da1702904bc29cbc730824016de9025da69fad3915f1d2f57a1eb080d5
                  • Opcode Fuzzy Hash: 87c0e88b5ea13b8790281be6d90c2fba3f0936068f40d0d6b84a5a2dcda2de8f
                  • Instruction Fuzzy Hash: 1F91CE70A046168FCB15CF69C580AAEF7F2FF88311F108659D45A9339ADB30BD51CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3fac472a03346486f4b6c3f9d4c88cea687787d9ed37f26bb6c14936096f55c4
                  • Instruction ID: 74d7201dc1867ebf6708bfd762a276082c6e1f5ebbecca24a09e389d52c46477
                  • Opcode Fuzzy Hash: 3fac472a03346486f4b6c3f9d4c88cea687787d9ed37f26bb6c14936096f55c4
                  • Instruction Fuzzy Hash: 15816B35B006118FCB18DFB5C4A496ABBB2FF89315B1085A9E906DB761DF35EC02CB80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c60b4a2ae9338768df773003c952357bef91342ac984ecbfe26f4db9737585a
                  • Instruction ID: cd6e625539d6c200236b97f7d5c5fad38b0db1a4036739280221c152ae36f53e
                  • Opcode Fuzzy Hash: 9c60b4a2ae9338768df773003c952357bef91342ac984ecbfe26f4db9737585a
                  • Instruction Fuzzy Hash: E2813E74A01205DFDB14DFAAD990AAEB7B2FF48305F1485A9E505AB350DB34FC46CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e3b1e06073fa42daa6ae5fb6a3fd1a9d2f61f2ee1c6e4884440bc9a91e79d4fd
                  • Instruction ID: 3fe179b8598a9cb9533aa14ddc34d07bca8df04ac22aa97d6c35c31b69068253
                  • Opcode Fuzzy Hash: e3b1e06073fa42daa6ae5fb6a3fd1a9d2f61f2ee1c6e4884440bc9a91e79d4fd
                  • Instruction Fuzzy Hash: C67171B02007048FD314DF26D494B97B7E2FF84318F108A6DD49A4BB61EB75BD0A8B90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: da905cd0de1adba01ebbaff9e6ff56304fa3301eaf488f8fb8727d3594cd3d2c
                  • Instruction ID: 4f0655add906770f8b741f761c5f7336003fc6208b43d2a8d3ca213537d38205
                  • Opcode Fuzzy Hash: da905cd0de1adba01ebbaff9e6ff56304fa3301eaf488f8fb8727d3594cd3d2c
                  • Instruction Fuzzy Hash: B1515B34710214CFCB58EB38D56566E37A6EF88304B258869D502DB7A6EF7ADC02CB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 03b509a93ca297379d3ef5c265aeb98f8e23aa4ecd3c76396eaf82d89146658a
                  • Instruction ID: b9591e5b7fb42728ccce57ea1eecd92707cc5d5cbe0ec23bb3ed3edb4782689f
                  • Opcode Fuzzy Hash: 03b509a93ca297379d3ef5c265aeb98f8e23aa4ecd3c76396eaf82d89146658a
                  • Instruction Fuzzy Hash: 4D51B6B5A1021ADFCB05DB64D889CEFBB7AFFC57007104519E502A7351EB349E09CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bad20fff6419a390b093b56c10b083688a7d507a8c51b0620c3a0ed7594c1972
                  • Instruction ID: 4d3de852c42de19ddea258411ebd1a158b531a1c4ec539f466c585bb2b832e17
                  • Opcode Fuzzy Hash: bad20fff6419a390b093b56c10b083688a7d507a8c51b0620c3a0ed7594c1972
                  • Instruction Fuzzy Hash: AF515A727042959FDB11CF69E4406AABBE5FF88329F0880AAE84DD7341DB35BC41CB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 773097da2793e08070332b550996dac9c125982979011a08746e3c072f7d50e9
                  • Instruction ID: 0aef23782c759dc73c8954dfa53bf30849b2571cc9031f2ebb4f5e990f35076d
                  • Opcode Fuzzy Hash: 773097da2793e08070332b550996dac9c125982979011a08746e3c072f7d50e9
                  • Instruction Fuzzy Hash: A2516C34710204CFCB58EB38D4656AE37B6EF89304B2544A9D402DB7A6EF39DC02CB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 29c8ca87b03f00dfc36ee1e3c8fa26a2c54882946f4030aef09698796b5a0eec
                  • Instruction ID: 3c63f5952288f639c26acabd325289aa4ab2c95cf7eed78d63807d898366b3b7
                  • Opcode Fuzzy Hash: 29c8ca87b03f00dfc36ee1e3c8fa26a2c54882946f4030aef09698796b5a0eec
                  • Instruction Fuzzy Hash: 434146706082809FCB169B78D8946E97FB2EFC6309F1440FAD4859F262DB316C07DBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 695280d0698a08a6e5291a129268678a4fb3ec6950341bede0d2acb89460eebb
                  • Instruction ID: 391540e28def959499f83d352f847a42c232473320b3a66ab1adcda49a08a264
                  • Opcode Fuzzy Hash: 695280d0698a08a6e5291a129268678a4fb3ec6950341bede0d2acb89460eebb
                  • Instruction Fuzzy Hash: 49413C74A00619CFCB14DF6AC4849ADBBF2FF88315B158599D805AB720EB35FC41CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d700d266f66c35be2dfc89111494a2f4d5273b058e39a8de164cdaa92ae7164a
                  • Instruction ID: 672468e3e350657846cf9013a880062195a460fb8b199faa5a44174d4a0a5ce3
                  • Opcode Fuzzy Hash: d700d266f66c35be2dfc89111494a2f4d5273b058e39a8de164cdaa92ae7164a
                  • Instruction Fuzzy Hash: 004109B5A002198FCB11DFA9C8809EFB7F9FF8C314B14466AD91AE7615DB30E901CB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c8ba828e9cb982d5b5eb102a064542f9131fe39d6ad32aaff9d126460363cbd
                  • Instruction ID: 1ee8baec93eef94c9ae4f43c1173c69ad143dc81728186c182c9db1859b5f4d2
                  • Opcode Fuzzy Hash: 9c8ba828e9cb982d5b5eb102a064542f9131fe39d6ad32aaff9d126460363cbd
                  • Instruction Fuzzy Hash: A2213677B1011057EF2446BAB8013FE739ACBC4366F0084B6EA18D7680EE29996642D1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 40ed2ba98d84ba1ce128cc09122803e9b4aff6ec742673726bf43a469fcd5c29
                  • Instruction ID: 4eb9905f1912e27cc4c866fbf7bb37b8936abb9ce217552f1cd9c02f4bd69b9b
                  • Opcode Fuzzy Hash: 40ed2ba98d84ba1ce128cc09122803e9b4aff6ec742673726bf43a469fcd5c29
                  • Instruction Fuzzy Hash: F9418075B101059FCB04DF69E9848AEBBF6FF8C250B154469E809AB321DA30EC05CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6940389bbdae9354fa2b13af41b949724d56be9a3f33bc9692b575bd52536b1d
                  • Instruction ID: 63f59d41c3f113118f98ed3624f30bbc02e69ac2f8228dc9c8a426387f39811e
                  • Opcode Fuzzy Hash: 6940389bbdae9354fa2b13af41b949724d56be9a3f33bc9692b575bd52536b1d
                  • Instruction Fuzzy Hash: B53141703007008FD7389F26E594A2A73F6EF9525A7008AA9D88287B55FB34FC47DB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 914a8bde77d5cd00be21dfdd20d5ece584d2e48a6a95e924a60f91cbd5a491f4
                  • Instruction ID: e4c623ed9fc0c60d0510d2962fbb5c0fc8f5180da9e44febfc7c151120eff463
                  • Opcode Fuzzy Hash: 914a8bde77d5cd00be21dfdd20d5ece584d2e48a6a95e924a60f91cbd5a491f4
                  • Instruction Fuzzy Hash: 99317E74B202018FCB54DF69E69996EBBF6FF88611B108569E10ACB7A1DB70DC05CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3483b81af05383bd9d729ba16774dc6949ca36cd5e69aec8b33e00ac26444b21
                  • Instruction ID: fed0d79de1561d9db05dfd9de1ffd5134a170086e4e3e268ba6637cca1d17601
                  • Opcode Fuzzy Hash: 3483b81af05383bd9d729ba16774dc6949ca36cd5e69aec8b33e00ac26444b21
                  • Instruction Fuzzy Hash: 25215675F242058FCB14CBA8E5629BEB7B2EFC5214B1480A9D80A97751EB35EC01C7A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4a344ffb56301ed2382ac619d299b4f1d788de71a3777c91091d2df0adcafe46
                  • Instruction ID: cda4269ad5f635ac0ecfb35e50a02d35d3d8bfc65aa88cb12fd66287d8b1799c
                  • Opcode Fuzzy Hash: 4a344ffb56301ed2382ac619d299b4f1d788de71a3777c91091d2df0adcafe46
                  • Instruction Fuzzy Hash: A7311E75B10119DFCB14DF69C4859AEBBF6FF88710F218069E919AB360D7709D09CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 747e3cf466fd76bb654567ccba1bc045867eb45b6d3edc3ab0299eb299b103e4
                  • Instruction ID: f1bcf349721f5bd7fbce7f7e5773ce3aec55fc98c3467a258adc6a73dce2e719
                  • Opcode Fuzzy Hash: 747e3cf466fd76bb654567ccba1bc045867eb45b6d3edc3ab0299eb299b103e4
                  • Instruction Fuzzy Hash: 34316F75A10119CFCB04DF69C4459AEBBFAFF88710F218069E809EB361DB749D09CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7c1bf6243a858f16c379294830adcc148310b2ba791941e9081755aa3cff4f12
                  • Instruction ID: c371296df12201eb4181906f5a8f1362591c4b4e85bf476ee82dc1838013eeaf
                  • Opcode Fuzzy Hash: 7c1bf6243a858f16c379294830adcc148310b2ba791941e9081755aa3cff4f12
                  • Instruction Fuzzy Hash: E8414F38A10514CFD754DF65D984E99B7B1FB88315F2580D6E80AAB362DA31ED42CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6338e6501804fd4b6239ebead9c05a9cc0da530d490f788740e931c2ec99a7a1
                  • Instruction ID: d2c1fe1999aaa17a5fc8f8d9fc1b7cc2c34e00d5aaafb74f753cbb00d8c7a30b
                  • Opcode Fuzzy Hash: 6338e6501804fd4b6239ebead9c05a9cc0da530d490f788740e931c2ec99a7a1
                  • Instruction Fuzzy Hash: B4414F38A10514CFD714DF65D988E99B7B1FB88315F2580D6E80AAB361DB31ED41CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b23cc7f674f67c42113dd0713272230cd92f8bea6bf56c77c809fb896c235ab9
                  • Instruction ID: 3e55133771ad500b68c6376dc2d13725550ef0421b1bcfbb3afb1d3221214661
                  • Opcode Fuzzy Hash: b23cc7f674f67c42113dd0713272230cd92f8bea6bf56c77c809fb896c235ab9
                  • Instruction Fuzzy Hash: 61415038A10514CFD714DF65D984E99B7B1FF88315F2580D6E80AAB361DA31ED42CF20
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ca5cffa72cd76ce8ce7c0d7eff74baa88b3253a25a8dd583f7cd3ab37f946bca
                  • Instruction ID: 7c61695ce15db462de5320aa51f2e8af92e683ded60b51e370abb4b312c96181
                  • Opcode Fuzzy Hash: ca5cffa72cd76ce8ce7c0d7eff74baa88b3253a25a8dd583f7cd3ab37f946bca
                  • Instruction Fuzzy Hash: 4D31C375600214CFDB00DF2AC9989D9B7B1FF49319B19C4DAD8519B722EB35E946CF80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 984a393dfba14b1b8cddf1d202c7bb8514f1825253166fc34ca45010053ee4a3
                  • Instruction ID: 6a4d735c2cca2e145ee4b00c1c560bf647458a1b26dda6fe59ff8fa32efcf661
                  • Opcode Fuzzy Hash: 984a393dfba14b1b8cddf1d202c7bb8514f1825253166fc34ca45010053ee4a3
                  • Instruction Fuzzy Hash: 8541E534A11219DFDB04DFA5E888E9DBBB1FF48306F148499E802AB7A1D775E845CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1e545c86b78548ba67a67a7cb0485f61e8f53f4aef555395ed66e08cb81e97ba
                  • Instruction ID: 6ca6193d39b87eb1519c5282d17aaffd1d4a115908b0315da91f75b37161db9a
                  • Opcode Fuzzy Hash: 1e545c86b78548ba67a67a7cb0485f61e8f53f4aef555395ed66e08cb81e97ba
                  • Instruction Fuzzy Hash: 45216D31300A108FC315DF2AE884A96B7F9EF85721B0548AAE55ECB761DB35FC46CB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0b50f4d2d0953f33cc0193cbb0fcc264b723abaf20a57ac4fb45f96bc09878f5
                  • Instruction ID: 6259bf21be0f1359e1e53126324a5caeb62f35b8e8e70d693ff27add2e453213
                  • Opcode Fuzzy Hash: 0b50f4d2d0953f33cc0193cbb0fcc264b723abaf20a57ac4fb45f96bc09878f5
                  • Instruction Fuzzy Hash: E7319E75F1011A8FDF05DFA8D5818EEBBF6BF8C210B058499E905BB321DA71AD058BA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f940a150c8cae9785cdda0f8506b63e44d7303070c95346ed4afec67068873d8
                  • Instruction ID: 22975c05bea147b9b4d727bdc013ff234ccd85927de97d22385a87d306145148
                  • Opcode Fuzzy Hash: f940a150c8cae9785cdda0f8506b63e44d7303070c95346ed4afec67068873d8
                  • Instruction Fuzzy Hash: C7313739B006059FCB04DF75D895C6ABB72FF89225B148499E906CB362DB35FC02CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c65f53090a7f2f8f35de610c0ab596fb23a440528011553a555918f9ddc88569
                  • Instruction ID: 875fe7f33348f8234eb12196cca515f089e1f7ac29d261ab86f5d1e0daff1b51
                  • Opcode Fuzzy Hash: c65f53090a7f2f8f35de610c0ab596fb23a440528011553a555918f9ddc88569
                  • Instruction Fuzzy Hash: B43181B5E002168FCB14DF68D5419AEBBB2FF88314B144569D419AB361E771ED06CFD0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 851ac596a077274aa64262bd51e9a280607c36ebb0b863bbd4144c358eae9b18
                  • Instruction ID: 8958bcd2f1c0d437af8dcb1e481c5d3de9c0fb41a6f04e1d75a0f190fdf752a6
                  • Opcode Fuzzy Hash: 851ac596a077274aa64262bd51e9a280607c36ebb0b863bbd4144c358eae9b18
                  • Instruction Fuzzy Hash: F02117B5B002199FCB10DBA9D844AAEFBF5FF88220B008525E919A7310D734AD54CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.524547236.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_109d000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 894a2ecce547e1b7fccd928c636bd1bb8cbfd81e437ba58d0fafc5d1d80ccc9b
                  • Instruction ID: ecf91ae637f8634ae5a9667558bd4b614620e69ced954964fe86881ed4158dd4
                  • Opcode Fuzzy Hash: 894a2ecce547e1b7fccd928c636bd1bb8cbfd81e437ba58d0fafc5d1d80ccc9b
                  • Instruction Fuzzy Hash: 95214576544240EFCF01CF54D9D0B1ABFA1FB88328F2485A9E8890B606C336D856EBE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.524547236.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_109d000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5a18c2eda8663ed7376e9b0193b8c52891b29d858968e76e753d840d05b33f9c
                  • Instruction ID: 6418554a69a169a38d6c7d2705b331caa9d53c061ad58e7d55ea14a8d97a1d3f
                  • Opcode Fuzzy Hash: 5a18c2eda8663ed7376e9b0193b8c52891b29d858968e76e753d840d05b33f9c
                  • Instruction Fuzzy Hash: 2D213771544240EFDF05DF58D9D0B1ABFA5FB88328F2485ADE84A0B606C336D856D7E1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f533f14768cb3614a961f3d8b0656143534e722861061a4d66df6ec99d40c837
                  • Instruction ID: 433af233dc1caa5d9a64f1b3f91e10ee564af7ac2c89359dea955e0a98275ee7
                  • Opcode Fuzzy Hash: f533f14768cb3614a961f3d8b0656143534e722861061a4d66df6ec99d40c837
                  • Instruction Fuzzy Hash: 4E31F874A002198FCB04DF66C9849AEBBF1FF88315B1585A9E809AB311E734ED05CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bf5ac4dd1b0391d185d33ab9422953e5535b457ca6383da3ebe3acbce2787c52
                  • Instruction ID: 0713a5cc249dc3cd2e30f5d177930b275666da685c67257b0d6bd1eec5992cc5
                  • Opcode Fuzzy Hash: bf5ac4dd1b0391d185d33ab9422953e5535b457ca6383da3ebe3acbce2787c52
                  • Instruction Fuzzy Hash: 00216BB4B002199FCB10DF64C855AAEFBF5FF88210F008569E849A7311D7349D55CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cbb1e9f409132cdef51d453cff0bbd4794ad9c5cf3e4c3d55c7e8ef5ffb7a975
                  • Instruction ID: 2af9a3606a335d1bafa8bc8f434b89d54c2034833f3863386c40edfef0e170cb
                  • Opcode Fuzzy Hash: cbb1e9f409132cdef51d453cff0bbd4794ad9c5cf3e4c3d55c7e8ef5ffb7a975
                  • Instruction Fuzzy Hash: F521C170901298AFDB15CFA6D444BDEBFF1AF45314F0815ADE841AB252DB705985CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f9cb839626d24e783a240509ab7bd8937cc22f61df4e050f013c12045f585c77
                  • Instruction ID: d2c56b2808b3120236cfef30dd5685f83a53c04676dda76791f1202fcb3f5157
                  • Opcode Fuzzy Hash: f9cb839626d24e783a240509ab7bd8937cc22f61df4e050f013c12045f585c77
                  • Instruction Fuzzy Hash: 0F213535A00149DFCB04DFA9E549BEDBBF1EB48312F1480A9D905B7290DB71AE45CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4e52d4772b40ed7192262e8181388bcceb36ab9bd17e96acec4574586856b564
                  • Instruction ID: 057f04d1378cf0e495bbaf8b5b6b277ae321ebe0f51aab2b6589ed6653db36e9
                  • Opcode Fuzzy Hash: 4e52d4772b40ed7192262e8181388bcceb36ab9bd17e96acec4574586856b564
                  • Instruction Fuzzy Hash: 51213876A101098FDF01DFA8D4828EDBBF6FF88214B158555E909AB221DB31AC06CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5fb1321276fcf5b3fb6ef4f8e3b08f17eca56e3a54e87734d1e12f7e6d88453e
                  • Instruction ID: 12a4cd5c396386f79ea41439ff31beeceb420b1fefda96970fa505c9d723abd3
                  • Opcode Fuzzy Hash: 5fb1321276fcf5b3fb6ef4f8e3b08f17eca56e3a54e87734d1e12f7e6d88453e
                  • Instruction Fuzzy Hash: 99215734A01109AFCB14CFA5D5889EEBBF6EF48315F2481A9E802E7350DB34ED46CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a4e81dcd9d3bd3cc6294726ce01c3ab4ea47eb97630b9407ed5a37d723c2a6ec
                  • Instruction ID: 4569808a5aa26210ca2fd50b862166eefd0ad951f33f5886ee618d5b72880f6a
                  • Opcode Fuzzy Hash: a4e81dcd9d3bd3cc6294726ce01c3ab4ea47eb97630b9407ed5a37d723c2a6ec
                  • Instruction Fuzzy Hash: 3B11D6316006059FD310AB76D8A459BB7A6EFC1608B00C92DD18B8BB61DF30FC0ACBD1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 15cf0fca1a4df9c7a2adec58bf496504b217099fb80498990599bf5c93c366fb
                  • Instruction ID: bb47ed3eb8521c44cf2ac5768e9ad7a995b38c5b57b757e03a0771e64af9fec8
                  • Opcode Fuzzy Hash: 15cf0fca1a4df9c7a2adec58bf496504b217099fb80498990599bf5c93c366fb
                  • Instruction Fuzzy Hash: 2B11AB313002044BD324AB7ADC90A9B7796FBD4655B048D3EE1458BB90FF70EC06C7A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fe607dea49011a550cc263601cdf2e919843de5940ce148c9b26b5206c89b706
                  • Instruction ID: 1795b9c4f1bcc9fb5cbade6676f4d2451fbc96eb9707e776f2a2ebaf4a8bc80e
                  • Opcode Fuzzy Hash: fe607dea49011a550cc263601cdf2e919843de5940ce148c9b26b5206c89b706
                  • Instruction Fuzzy Hash: 0A119AB5E20219DFCB10DF98D995AAEBBB6FF4C210F10402AD909AB300D774AD01CBE0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cf717233479a5ab5e7d1a119060e05281a2ca71a8b31e62fe1b875dbdbe50303
                  • Instruction ID: 14592d8933491cebe1e57de1db300d1fd8b539b4e163a58aca4c4e4c847f5294
                  • Opcode Fuzzy Hash: cf717233479a5ab5e7d1a119060e05281a2ca71a8b31e62fe1b875dbdbe50303
                  • Instruction Fuzzy Hash: A221E435A00204CFDF28EFA0C499BEDBBF1EB88315F144469E8017B380DB746985DB92
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 97e114a51cd4a3d33eb820cba180bb5672d89870cb1c08274c772ac3ee96934c
                  • Instruction ID: cb39ee327fb0c116ba2ed8fe95defb1f4d33dafa345350fcf1254fa4137001a3
                  • Opcode Fuzzy Hash: 97e114a51cd4a3d33eb820cba180bb5672d89870cb1c08274c772ac3ee96934c
                  • Instruction Fuzzy Hash: AC2115B2D006199BCB10CFAAC8447EEFBF4EB48324F15812AD518B7741D774A944CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 50602b2644fdc8888c835de2d261c07f1b2d4148cdb21d527ed19f0b11dd51e0
                  • Instruction ID: 245689b2f97286bb17f122432ac5b528ac308afe2855fce21e672849a2b01114
                  • Opcode Fuzzy Hash: 50602b2644fdc8888c835de2d261c07f1b2d4148cdb21d527ed19f0b11dd51e0
                  • Instruction Fuzzy Hash: 2F218CB2E10219DFCB04DF98D995AEEBBB5FF4C210F10402AE909A7340D3749940CBE0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9858e0354b2c63f5d865d1d5b71967173af029e9d49ad6ad941321543414dd49
                  • Instruction ID: 882affef2653682fecc4111cbbe67f6a40fc1aa3623c7d13656687a5f96cf326
                  • Opcode Fuzzy Hash: 9858e0354b2c63f5d865d1d5b71967173af029e9d49ad6ad941321543414dd49
                  • Instruction Fuzzy Hash: 541193307002059FD320AB66D89496BB7A6EFC4618B00C92DD19B9BB54EF30FC0ACB91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 77c7a8cd8a63035b3348b305b5072f33d2a6ce43551e32ed7ef4118f58ff7501
                  • Instruction ID: ec8263490ccdaaa9f43923c778bfda9a41c91be496fd1b27af74208d28a51e3a
                  • Opcode Fuzzy Hash: 77c7a8cd8a63035b3348b305b5072f33d2a6ce43551e32ed7ef4118f58ff7501
                  • Instruction Fuzzy Hash: 431121757202258FCB049B78E8A94AEBBB6FFC82217044559F546D73A2CF70AC02CB84
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d28722ab51cd428156a44e2e9795ff6c99c1bf21738822822407e1cd06edbdc1
                  • Instruction ID: a4fa84485036ae8269922cb90f4fdcdc2bcb21a3f261908244afb625f8b1fb63
                  • Opcode Fuzzy Hash: d28722ab51cd428156a44e2e9795ff6c99c1bf21738822822407e1cd06edbdc1
                  • Instruction Fuzzy Hash: 3D11F4B1D006599BCB10CFAAC8447EEBBF4AB48324F15812AD918B7740D778A944CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.524547236.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_109d000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction ID: 8b6d2ff317d7beaaaac44b8a7a74d3db522df46519653d303edadf60fc40c04b
                  • Opcode Fuzzy Hash: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction Fuzzy Hash: 1F11E176404280CFCF12CF44D9D4B1ABFB1FB88324F2486A9D8480B616C336D456DBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.524547236.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_109d000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction ID: 9b2be2ca5d0b9918c8c5e1ede1e78a65244ffa9c37109195f61cd55bebb624c4
                  • Opcode Fuzzy Hash: 443a7f9af640cd919331e281847f8d6becf020b849bdf04c35086449af5cbafc
                  • Instruction Fuzzy Hash: 0011E172404280CFCF12CF44D5C4B16BFB1FB88324F2486A9D8490B616C336D456DBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a8337a941ce4646ece8196ffc6848157ce5641da928abbd57e6f4e6dcd1b732c
                  • Instruction ID: f802cdcc578193a3a85144ac824146a04ebbd5e0b45f644bec6f16c96d1640c5
                  • Opcode Fuzzy Hash: a8337a941ce4646ece8196ffc6848157ce5641da928abbd57e6f4e6dcd1b732c
                  • Instruction Fuzzy Hash: 2C0149323041436FE3288E6AAC903B63A5BD7C9214F0840FDF695DB746EC18AC035791
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 19da4704db884bce22b4b38d00a8345547179d40d3532df9052cefbde636a047
                  • Instruction ID: 5afe43664d1603cadd7f3f8e092588d390d3c819c33ea1bd845513e72fc37828
                  • Opcode Fuzzy Hash: 19da4704db884bce22b4b38d00a8345547179d40d3532df9052cefbde636a047
                  • Instruction Fuzzy Hash: F41196757102259F8B049B69E4984AEBBF7FFC86213144559F506D73A1CF71AC01CB94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9242c825cef775a7e873eb70ff497c61595ea1e4ab1ce59b2c2cfd6440abbd0
                  • Instruction ID: 02702e203bc1ec477124017bd070e3c971f4f900a48d8306a9bbca0b37851482
                  • Opcode Fuzzy Hash: c9242c825cef775a7e873eb70ff497c61595ea1e4ab1ce59b2c2cfd6440abbd0
                  • Instruction Fuzzy Hash: 0401A7227006544B8B24A67A58A11FE7A57DFC1168749867AD59ACF782EF28CC0847B2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8a8347f5721394db1b4911a6ac2095107cf61651d8441adcc3404e31c0c8961d
                  • Instruction ID: c045bc8684eedfd8eceba9323127da9c24685aaab048e977e97207d737da48bd
                  • Opcode Fuzzy Hash: 8a8347f5721394db1b4911a6ac2095107cf61651d8441adcc3404e31c0c8961d
                  • Instruction Fuzzy Hash: DA112171A005544BEB289FA9D0267FEBBF2DF88305F1484ADD841AB340EFB94D068BD1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6ea6005cb10ddd40b775aeba48dff2960e13999d1ba9e5d46832946e4ba54d48
                  • Instruction ID: cb3d6a9ad119eb0fee1f91cd960ea2cc758fca3b1441c8133038f5066c92755c
                  • Opcode Fuzzy Hash: 6ea6005cb10ddd40b775aeba48dff2960e13999d1ba9e5d46832946e4ba54d48
                  • Instruction Fuzzy Hash: 4701B935300304AFDB109F66DC84F9A77A6EB84715F04C429F6468B690DBB0ED069790
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e21eba801eba70b0d2e441819a9ff52c2bc6d229168d52b4f9950a9391cb59f0
                  • Instruction ID: 645d784816ca83bdbc23b30f587e3c80b909fcff5d2fe3d8a4bf5399234037aa
                  • Opcode Fuzzy Hash: e21eba801eba70b0d2e441819a9ff52c2bc6d229168d52b4f9950a9391cb59f0
                  • Instruction Fuzzy Hash: 6D012631A005144BDB189FAAC4157FEBAF6DFC8305F04846DD401BB340EF795D058B91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fcf1885be63cd634bf0464215328fe111c856be396814bcdf018cd70a2c1574f
                  • Instruction ID: d1fb548e7a08d812279ce73119003ca3596e2f650f496ba046df503b86cf08ed
                  • Opcode Fuzzy Hash: fcf1885be63cd634bf0464215328fe111c856be396814bcdf018cd70a2c1574f
                  • Instruction Fuzzy Hash: BAF04932B0425087D335492AA444727B7E6DBC8226F1C5DBDD50783240DB75A80BC3A0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.524547236.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_109d000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c5bee9d131d6357de8c1a01fcab85ba327a94c1e20ec0e3ce40000d00a5a3782
                  • Instruction ID: 2861e8d6036902a38582948292074a007f6f600e294346e87e0ea0b6557d9c76
                  • Opcode Fuzzy Hash: c5bee9d131d6357de8c1a01fcab85ba327a94c1e20ec0e3ce40000d00a5a3782
                  • Instruction Fuzzy Hash: 480147710083809AEF204A65CDC4767BFE8EF812A4F08815AFD845B643D3789885D7B2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f26830c57906f073477d6386d6731d8251ca3568112089fc41df6e165135854
                  • Instruction ID: 17818c809ad5f8ca61934b1230f55d8720e860211cbebf052240441d0e6049bf
                  • Opcode Fuzzy Hash: 8f26830c57906f073477d6386d6731d8251ca3568112089fc41df6e165135854
                  • Instruction Fuzzy Hash: FF01A775300304ABDB149F66D884F9A77A6EF94715F04C92AF54A8B660EBB0ED078790
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 587cc198d39a1bbb7c68339767e52704d3909dd853f342dc45a31c309afdb896
                  • Instruction ID: 039233c8e848c922b108084c901fb94f2758713e73c43e62b29eddefd5391351
                  • Opcode Fuzzy Hash: 587cc198d39a1bbb7c68339767e52704d3909dd853f342dc45a31c309afdb896
                  • Instruction Fuzzy Hash: 04F02BB7B0D3D11FC302472868691AB7FB5EF86111B1940ABD445C3253D9284C06C796
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 743de41106021b136c01e7a54f97894f0e698c8f31aba7a62ca777d88c2c247f
                  • Instruction ID: daf7d10f16ae64212c044c26e56a120a30fe2e36e862fd2da02b319366f8a9fa
                  • Opcode Fuzzy Hash: 743de41106021b136c01e7a54f97894f0e698c8f31aba7a62ca777d88c2c247f
                  • Instruction Fuzzy Hash: BBF0E0317056601BE31107AA98A45BF7F96DBC9655B154176F745CB340D5119C0347E1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 518d9616e9257ce9ceba71b0863c23cdb5586477bc0753e48875b013bcff14f1
                  • Instruction ID: 1e427e77d18f7b69f6b7126f43633ff4c23f1dfade08db8ab4fbf6284e4461f6
                  • Opcode Fuzzy Hash: 518d9616e9257ce9ceba71b0863c23cdb5586477bc0753e48875b013bcff14f1
                  • Instruction Fuzzy Hash: B9F04C31B04390D7D7354A7B5448717BBEAEBC9319F1CA9BD984787282EB75A806C3A0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d0f44af192eaf4f0f5d9a539f3f69a0d4f4dc9d46972ef96d8ed344a7a3b1ed7
                  • Instruction ID: 923c1e23de86f82a98e3ede3f11772847facd6d6e78436f5f72fadd9c78e8950
                  • Opcode Fuzzy Hash: d0f44af192eaf4f0f5d9a539f3f69a0d4f4dc9d46972ef96d8ed344a7a3b1ed7
                  • Instruction Fuzzy Hash: 49017870624380CFC3198B39E888A557F70EF43325F080AD6EC964B7B2E634AC55CB82
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f2f49ef8c28c9032f4fd5d3141fc5089e8899ea162b8c50f163310524d7d99e6
                  • Instruction ID: 7448d435751a5132f36d25ede5908d795bd58690be7f8afd1034826d9bb611b3
                  • Opcode Fuzzy Hash: f2f49ef8c28c9032f4fd5d3141fc5089e8899ea162b8c50f163310524d7d99e6
                  • Instruction Fuzzy Hash: D501D6307042055FCB00EBA4EC5459EBBB5FFC5204F04892EE549A7651EB306D068791
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 70e1b12cfafe5c850b459085bce2c2da3f821f16604e9fe960a7d5b637a0b71a
                  • Instruction ID: 0e16b099856e0071bca12d6b3bb2747cf5c38d23d26abecdde5a3070a93a34c0
                  • Opcode Fuzzy Hash: 70e1b12cfafe5c850b459085bce2c2da3f821f16604e9fe960a7d5b637a0b71a
                  • Instruction Fuzzy Hash: 19F06235A11219DFCB54DF65D98589FBBF5EF887147108029E90997211D730AA19CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.524547236.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_109d000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0aae827beac25e5acd4bdd9f7f193d348f5bf33f9211c0a569db8c91cab5210e
                  • Instruction ID: e9d008bb1ed80a694a8cee78dfb3dfc94c19bcb911f5df941d1a9bced7ce0945
                  • Opcode Fuzzy Hash: 0aae827beac25e5acd4bdd9f7f193d348f5bf33f9211c0a569db8c91cab5210e
                  • Instruction Fuzzy Hash: 02F0AF714042849AEB118A19C884B62FFE8EB813A4F18845AED485B287C3799844CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f71a838c314b61b6ea04e4026ec134a0b558c069bcaa010d51f7764b42f3bf7
                  • Instruction ID: b22e9def782ba5c6786cf71dc43d4ea48d9efdfe94e4cb67c303f79fb607bf5f
                  • Opcode Fuzzy Hash: 2f71a838c314b61b6ea04e4026ec134a0b558c069bcaa010d51f7764b42f3bf7
                  • Instruction Fuzzy Hash: A4F0C8352007406FD3049755C99098B77E6DFC8714B00C86AE28B8BB60DB30FC06C7A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d411c24623ee5df0d18ef986406d76c8caa58cf2ca685f1c8e0b470cdecb8c6
                  • Instruction ID: 167793bdc29740d322ba87d7ebe150c2492e9991defc21c4e029d5d33350bf58
                  • Opcode Fuzzy Hash: 5d411c24623ee5df0d18ef986406d76c8caa58cf2ca685f1c8e0b470cdecb8c6
                  • Instruction Fuzzy Hash: 02F05EB2B0C6114FC74DDA2DA85042A7BE3ABD8201B1AC8ADF888C3355EA319C068759
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aa862c42439273bf79b12e9233e18ff61558d542207e84dfed0a52b9d706643a
                  • Instruction ID: 3683d72351091f4d47c0a6cfd79e4a98d91cee6c23a86d3d0f3d674c93903b49
                  • Opcode Fuzzy Hash: aa862c42439273bf79b12e9233e18ff61558d542207e84dfed0a52b9d706643a
                  • Instruction Fuzzy Hash: 9201F634A01228CFDB24CF59D988BA8B7B6FB04312F1080E5D50AAB251CB31EE85CF11
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e611868885d4df51fc3461f05c3065d6534fc85b7fedf42fbb0edb9e7fb71fae
                  • Instruction ID: 937f7ae3a36e3e87273ac059c0d1fc4b7a4da105c3797de4fbcadcc95b06fe19
                  • Opcode Fuzzy Hash: e611868885d4df51fc3461f05c3065d6534fc85b7fedf42fbb0edb9e7fb71fae
                  • Instruction Fuzzy Hash: D6F0E533B100308BD3248F5DE045914B7E9EB88662B0242A7EC06C7310DA60DC0287C0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 128c726557e0844d442d58e1d8e594d7f3516a77ae7da6dc49d17c807fb00e26
                  • Instruction ID: b4c04068c345556929060932934a1f0b5d8658e00cf0151de10a68ea8b2452ee
                  • Opcode Fuzzy Hash: 128c726557e0844d442d58e1d8e594d7f3516a77ae7da6dc49d17c807fb00e26
                  • Instruction Fuzzy Hash: FEF01D74704B05CBDB20CE36E8457EAB3A1FB44309F104C69D09BC6A50E7B9F845AB41
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 84058b4af6677eae52cf6ff6027650622ec7cdd5fa6611e72095a289a355b8f9
                  • Instruction ID: 395a59c18f95e488f8c92dc929c210aac81ab117ae55cc9af231f42899dcf2a1
                  • Opcode Fuzzy Hash: 84058b4af6677eae52cf6ff6027650622ec7cdd5fa6611e72095a289a355b8f9
                  • Instruction Fuzzy Hash: 77F0B261A0E7C56FEB0386359DA5285BF708F43208B5D08EBC8C9CF493E91A940AD363
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 74c8a81d2c172fd7fc266736348c00de984121f682f6e3ce34f033fd1e04d1fe
                  • Instruction ID: 872c1798244b803162353da70a04966742d2afe1faa1ddbfae5bf3b3079eb753
                  • Opcode Fuzzy Hash: 74c8a81d2c172fd7fc266736348c00de984121f682f6e3ce34f033fd1e04d1fe
                  • Instruction Fuzzy Hash: 15E04F72B042266B47045A6E798946FB7EEEBC9560710903AE90AE3300EE759C0247E0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a5cb7bc1288b5d56e823d35ef092f80042d8ff7edbaf083a57338be47496cc57
                  • Instruction ID: 4f5e11b0a4e0e38568343291c1c851ef6dd77baca91f2862a990562eafb32783
                  • Opcode Fuzzy Hash: a5cb7bc1288b5d56e823d35ef092f80042d8ff7edbaf083a57338be47496cc57
                  • Instruction Fuzzy Hash: B4E0D83630122167D7201BAFAC5497BBA9EEBC8762F444139F749C7340C9225C0297A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2d5b9793d570a57f5962c34888063e7deae37b6672ebbcf63ccacc78df8f4592
                  • Instruction ID: a222347802d55140be09f41dc4e54f1126f38977b02271317f8292ee191b604d
                  • Opcode Fuzzy Hash: 2d5b9793d570a57f5962c34888063e7deae37b6672ebbcf63ccacc78df8f4592
                  • Instruction Fuzzy Hash: 42F089352006049BD314DB95D99499B77A6EFC8710B00C91DE65B87B50DF30FC0687E0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e7f926c337d0c6257fb25506fa23ae555cf4976762fb9ce78defdec575278738
                  • Instruction ID: 7c1b9a0071cec5d898fae943524fe41e7d393381e7d5d9429d40af00752f1964
                  • Opcode Fuzzy Hash: e7f926c337d0c6257fb25506fa23ae555cf4976762fb9ce78defdec575278738
                  • Instruction Fuzzy Hash: E2F065316083155FD724CBE8E0447E67BE8EB84724F00407EE45ED3F81EBB568418790
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7ca80464fda778e1de2c08279821552cbc47183d65e58ca1406505bc35166cea
                  • Instruction ID: 17a57b55f9e73947e6c3e3e8f2a4b5c9d25e0d2ab2ad6bc1a00f8a1f2c811cdc
                  • Opcode Fuzzy Hash: 7ca80464fda778e1de2c08279821552cbc47183d65e58ca1406505bc35166cea
                  • Instruction Fuzzy Hash: 52E04F37B005349F97349FAED448C19B7E9EB8966630642BAE906D7321CB61EC0187D0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 520cff47ed0e9481e35a02f783dfc5b0f58db8d43ced33a76e9ac5c70676ab80
                  • Instruction ID: f0d0159d3487d62d58b19498cdc8f464125d0e2a7ad5f7a5f943f7abbb340336
                  • Opcode Fuzzy Hash: 520cff47ed0e9481e35a02f783dfc5b0f58db8d43ced33a76e9ac5c70676ab80
                  • Instruction Fuzzy Hash: 54E0E5362409109FC324CF1AE488D56B7BAEF89761B1640AAE91DCB771DA32EC42CB50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 040967736ff174d00549558eaff7c413ca404b99fa5a3a71b5717aceff158c57
                  • Instruction ID: 40266609077b781ea10bd6d940248096002eb5b8580662516708d27e9b4d6810
                  • Opcode Fuzzy Hash: 040967736ff174d00549558eaff7c413ca404b99fa5a3a71b5717aceff158c57
                  • Instruction Fuzzy Hash: 6DE012713201545BC3148B5CB845A927BEDAF8D214B248059E445C7351DA64DC428B54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a6933231492906f4e902ab849287cc97567179b26e914503804de16efec2db6
                  • Instruction ID: 08435f4bc01b1e52f7b479916c3962e17a03836ff09bc3fd6186a99f3dbc918e
                  • Opcode Fuzzy Hash: 1a6933231492906f4e902ab849287cc97567179b26e914503804de16efec2db6
                  • Instruction Fuzzy Hash: A5E01A357562208FC304DB78E445C557BF8EF4A62431680EAE919CB3B2DA65DC468B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5c2d37592e35d60b00a2cae5fc654d81e8af7f013c549c32178f3e51eb60b0b6
                  • Instruction ID: 63502ad543ee0a87ed2523a674e5ea35ac7d63d316c2ea52300a25d91bb33961
                  • Opcode Fuzzy Hash: 5c2d37592e35d60b00a2cae5fc654d81e8af7f013c549c32178f3e51eb60b0b6
                  • Instruction Fuzzy Hash: 73E092E584E7C0CFC70646B1A5669943F21AA3A200F0B4ACBDCD04F293E9489C268397
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cd093e27273249a1b92ecb21f4861432f26b0cd356b43c8b054ab9cc8f73aebe
                  • Instruction ID: c7acf210664f5a5d05f5c25ef280bcc338b5d412f31a246065dd0ec584f8c93c
                  • Opcode Fuzzy Hash: cd093e27273249a1b92ecb21f4861432f26b0cd356b43c8b054ab9cc8f73aebe
                  • Instruction Fuzzy Hash: B9F03071D481889FCB80DFB994056AEBFF4AA19101F14819AE958D6241E23446128B91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 86e5460fbb158c004be776f22796a1999d5df85a9fc0b8aa8c3f0ac11160d870
                  • Instruction ID: 3086e36aca630e87c0ca57a47edcb05b9bb969ea43d9195922f4e0b304f847c5
                  • Opcode Fuzzy Hash: 86e5460fbb158c004be776f22796a1999d5df85a9fc0b8aa8c3f0ac11160d870
                  • Instruction Fuzzy Hash: D2E0B6352009109F8314DF1AD888C56B7EAEF8A66271540AAEA09CB371DA31FC41CA50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d6418923a88d1ee1c16c72c436d8071813329a05d3b569a9ccc3866d1c465f7b
                  • Instruction ID: e0f8d3a520ed281e1a3c93ba1ec5e630ef069697c06fafb462c1af2e8638dfe4
                  • Opcode Fuzzy Hash: d6418923a88d1ee1c16c72c436d8071813329a05d3b569a9ccc3866d1c465f7b
                  • Instruction Fuzzy Hash: CBE086352255508FD318CB18E056BA67BA1EF5D300F1540DDE546CB395CF369C41CB44
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f079808ca2201a5f6afc006c919a19a813d04af81adcd8345e680d1e6f54f690
                  • Instruction ID: 21a9a6b3bee2c7edd4f64f9e16fcf19800a00a8a79c64645c23ed7569a7fc809
                  • Opcode Fuzzy Hash: f079808ca2201a5f6afc006c919a19a813d04af81adcd8345e680d1e6f54f690
                  • Instruction Fuzzy Hash: C3E0CD3650425406D3649B68E5853EBBFC09F40224B04C46EC59987734DE15D840C750
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54f1f669b26a2b345c39cbe1d33e48dd52b805c50ae3cd2fe4a48284fb78b2ee
                  • Instruction ID: 22fb4c75482bfcc254c1133887b61cd98b4b001e50331fa71a63cbfdb895d7e4
                  • Opcode Fuzzy Hash: 54f1f669b26a2b345c39cbe1d33e48dd52b805c50ae3cd2fe4a48284fb78b2ee
                  • Instruction Fuzzy Hash: E8F0C231A01128CFDB60CF49D884BA8B7B2EB44312F01C1E6D509AB251CB31AEC9CF40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 41041464652b8c64847a1ebd78ad2073441f20bc67b4ceef267bcedd45449d50
                  • Instruction ID: cf986bf50e5f1ffbc3d40221e24dab866ab3c375aa0c0d9678a1c85005b16116
                  • Opcode Fuzzy Hash: 41041464652b8c64847a1ebd78ad2073441f20bc67b4ceef267bcedd45449d50
                  • Instruction Fuzzy Hash: 64E0BF71D0415D9F8B90DFB998016BEBFF8AA19201F1081A6E958D2241E63496519FE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4bc04e645b24015dc5a18b419f501fbc2961973b06ff944c88fb09225005e6ff
                  • Instruction ID: 2558e1fa9670bb9b60c3a59b005d9d5b06f08e486bccaa66d41d4f15692005da
                  • Opcode Fuzzy Hash: 4bc04e645b24015dc5a18b419f501fbc2961973b06ff944c88fb09225005e6ff
                  • Instruction Fuzzy Hash: 9DE02B73A041549FD704DBE894413DE7B65EF45318F0048FFD209CB641EB71255683E4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8e03377324995820ad3960c0ae76027b9aa5b1326901a9e3c6ee929f430e3811
                  • Instruction ID: 9776b6ea109c116da7c3fd4442384c1cb78a2e25c90b1d6691de04584c0ec79e
                  • Opcode Fuzzy Hash: 8e03377324995820ad3960c0ae76027b9aa5b1326901a9e3c6ee929f430e3811
                  • Instruction Fuzzy Hash: 90D0A9307200245BCB08A7B9E0268AE37DA9FCB66478001A9E146DF360DF3EEC004BD6
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b424fcee09ee4e4ce8f3c50964868aecff87e6f999cfb1ea5cd4162c4abfdc7d
                  • Instruction ID: 81d3784f4b5594ea5cf4450a2dc8a5967a0993deff2c719a0c82fd26ad546b5d
                  • Opcode Fuzzy Hash: b424fcee09ee4e4ce8f3c50964868aecff87e6f999cfb1ea5cd4162c4abfdc7d
                  • Instruction Fuzzy Hash: 6BD05EA2E1524867D724CBF495126ADBB958B61205F000AEA9C06C7291FE754E2452C2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4371d92e4f20215017c09518f87a3eab5f4e6da2c0067919edbb8788a18e81f1
                  • Instruction ID: 03927fdf5d637e312339de82fe75fba5585456798bf38c4e6b2f5cf36b158f8c
                  • Opcode Fuzzy Hash: 4371d92e4f20215017c09518f87a3eab5f4e6da2c0067919edbb8788a18e81f1
                  • Instruction Fuzzy Hash: 63D05E339100198B8F00DA84E8458EEB735EBC1711B100012D60237551D7302A1E8BE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3531867edd5d21e1b76cad8756fb58ad988a310b1a3a84b677fae595b3aff5b6
                  • Instruction ID: 513a0413048960da8f4ce5f0ba90485408ebcdbf2e7d6039a87737ea7eda0d11
                  • Opcode Fuzzy Hash: 3531867edd5d21e1b76cad8756fb58ad988a310b1a3a84b677fae595b3aff5b6
                  • Instruction Fuzzy Hash: E4D05E339100198BCF00DA84E8458EEB739EBC1311B100012D60237511D7302A1E87A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 73b8a58054f50a6f5dd8c2eb043e425c7d45c75ee43b192c4f922021f8f9da31
                  • Instruction ID: 872bca5974ef6126c456000d655b017ea1dfbe0d8e1cf1769cabd4e8689ce8b5
                  • Opcode Fuzzy Hash: 73b8a58054f50a6f5dd8c2eb043e425c7d45c75ee43b192c4f922021f8f9da31
                  • Instruction Fuzzy Hash: 3DD05E339100198B8F00DB84E8458EFB735EBC1611B104012D60237151D7302A1E8BA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4fae2b29c2a5ef2b3e0fa010529287f64ccf0570a4cd85837d90cb92afd2d948
                  • Instruction ID: d84a26b2539685b1ab50ccb66384ec4f974d076a315cbef446e8b6c879e59817
                  • Opcode Fuzzy Hash: 4fae2b29c2a5ef2b3e0fa010529287f64ccf0570a4cd85837d90cb92afd2d948
                  • Instruction Fuzzy Hash: 49D09E77914019CB8F04DA85E9858EEB735EBD5615B114412E60277551D7302A1ECBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25a6f13ec569baeb0a17bd96efd51659695f9ae70048acfd02921853ac45458a
                  • Instruction ID: aa3d3c2ce9d9773210e8a05e205a45cf218955adcab9c906953237170da22c8d
                  • Opcode Fuzzy Hash: 25a6f13ec569baeb0a17bd96efd51659695f9ae70048acfd02921853ac45458a
                  • Instruction Fuzzy Hash: 46D05E339100198B8F00DA84E8858EEB739EBC1311B100012D60237511D7302A1E87A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6227ae7406943bb2b4d1615676eb5d585b9f9f276cbb0f8cb641e9360de9a88
                  • Instruction ID: 0a77d8c6d0a160b82212fd3f36633273804cfcaa538826154a4ed7e41cb30cc7
                  • Opcode Fuzzy Hash: c6227ae7406943bb2b4d1615676eb5d585b9f9f276cbb0f8cb641e9360de9a88
                  • Instruction Fuzzy Hash: 60D0A75652514B1BCB0127C0B5676313F29EF86020F14D188EA8C01253FD518403C380
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.520468459.0000000000DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_df0000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 222d38401575c7ff8db8a6fdc6c34b1f9cbdc82b766f7a4824b09c9177662a00
                  • Instruction ID: c6ee1709fe635bfa8eb9175dac778eb85e040d266486de5a3af1e760ddb709fc
                  • Opcode Fuzzy Hash: 222d38401575c7ff8db8a6fdc6c34b1f9cbdc82b766f7a4824b09c9177662a00
                  • Instruction Fuzzy Hash: 13D02230B083480B4330A7AEE40045BBFCD9E82124304C47EC1AE87B00EE61EC008BE0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 73bbd99064edc59bb6fc70ed9062949c37f288d66652436a17b4ac37586be80c
                  • Instruction ID: 37010fba035440ce78afc354ecf60bda2bfa0c7b6f87df21978de19205ef0a41
                  • Opcode Fuzzy Hash: 73bbd99064edc59bb6fc70ed9062949c37f288d66652436a17b4ac37586be80c
                  • Instruction Fuzzy Hash: 05E012B195454ACFDB149F95D01A3FDBAB09B4834AF208899C002B5240CFBD1D55DF95
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9018288f793e39c70f57bfcd9df1b505ea0f430b749bf3c7bb860749e5ce6411
                  • Instruction ID: fe125a42efdf4bea3343403f6a01e24bfd4adb0d2c966c6db2a7ac0e688a9c42
                  • Opcode Fuzzy Hash: 9018288f793e39c70f57bfcd9df1b505ea0f430b749bf3c7bb860749e5ce6411
                  • Instruction Fuzzy Hash: F8C08071A0024CA74B54DFF099134BE77DDC741204B0045DAD906D7301FE359F0052D1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3bf0bd5f702c0ea463c49a66a6e19a3a1b521a6089edf55a76a24f5f5e015438
                  • Instruction ID: 49fe3a5b65cb7c06805c6c5fc0d59e2ba03a7033edf8aa47452b62aec2234ed7
                  • Opcode Fuzzy Hash: 3bf0bd5f702c0ea463c49a66a6e19a3a1b521a6089edf55a76a24f5f5e015438
                  • Instruction Fuzzy Hash: F7D0927094420AEBEB209F82C8997BEBB70FB00306F144459E002A9190CBB82684DF81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dbd84f2f8abc2ab0a9638ee9a7097384efb23efb246cbf36f90c794b44c3c4f7
                  • Instruction ID: 7166174e5b0d20eddd0838ae6b8f0cbf444c66e690ba7b8a6881cd4ce241b8fe
                  • Opcode Fuzzy Hash: dbd84f2f8abc2ab0a9638ee9a7097384efb23efb246cbf36f90c794b44c3c4f7
                  • Instruction Fuzzy Hash: 15D0C9B094420AEBEF209F81D85D7FEBB70FB04306F104459E102A9190C7B91589CF81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fa76ed56abbc2048f82ca8f89a6f71267a2071343360d42e11e6f22770c84a39
                  • Instruction ID: 6040c5337e4ce85e33a4987f28ecbb0948cc5a9ce760dfe7414c3ae400892212
                  • Opcode Fuzzy Hash: fa76ed56abbc2048f82ca8f89a6f71267a2071343360d42e11e6f22770c84a39
                  • Instruction Fuzzy Hash: 15B09277B448159BDE159695F8192FCF320EBA8266F5000B2D22A81841E73A1A2B6686
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b5accc2f16f106b4619db01ca3d8cad9d338b37b682717fbbfe62f4f1f1af55e
                  • Instruction ID: d1851d3904be0efa7b2bf6307202a4dd036910bfe3debf2ddb64c969fc36afe7
                  • Opcode Fuzzy Hash: b5accc2f16f106b4619db01ca3d8cad9d338b37b682717fbbfe62f4f1f1af55e
                  • Instruction Fuzzy Hash: EFB09B77B444159BDE155595F8151FCB320DB94167F500072D11A85441D73B16275545
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.543424640.0000000005230000.00000040.00000800.00020000.00000000.sdmp, Offset: 05230000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_5230000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 45d558a3bed439caefb011f3bd17deb3257f6df3e00fd58413b4f03f5ebf081b
                  • Instruction ID: d4932052a3325a9c39ef9dbe7b918a06de09c653150f0a6cb610705ca1d7cb89
                  • Opcode Fuzzy Hash: 45d558a3bed439caefb011f3bd17deb3257f6df3e00fd58413b4f03f5ebf081b
                  • Instruction Fuzzy Hash: A3C09B321141C74DCE01D724F5167DC7F20D78A225F059991D0C855413D6255447CB44
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 64cd2a74748254b97ec6300c4d633248b8b48c719d670773a4a897d76ae49fe9
                  • Instruction ID: ccf0ffa113be3c6da372d62fef09535644d6ebf8a13695d28df3fc7cdeed76ff
                  • Opcode Fuzzy Hash: 64cd2a74748254b97ec6300c4d633248b8b48c719d670773a4a897d76ae49fe9
                  • Instruction Fuzzy Hash: F5C02B61A4A2829EE3419741B41AB047F3D7B00306F0441CFF41E81891E38104308702
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ccb33d10c0c21ad0077b5c7887525fb45c53ab04d5e0f88c87e742e9e97c39f3
                  • Instruction ID: 334e3c56280a9bba47c9270b6a8092a53a7da204ef87e46f4af6154d497e28a2
                  • Opcode Fuzzy Hash: ccb33d10c0c21ad0077b5c7887525fb45c53ab04d5e0f88c87e742e9e97c39f3
                  • Instruction Fuzzy Hash: 36C09238240208CFC200DB5CD488C90B7E8EF49A1931580D8E60D8B332DB23FC42CA80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2e6735369989e234930ec7e1f89ef6280cad707dc842535bcb7532f23eaab467
                  • Instruction ID: 1426496952331ba7938a00083790ccd1e708a6bbeb572ae84d7eb690d36fcc27
                  • Opcode Fuzzy Hash: 2e6735369989e234930ec7e1f89ef6280cad707dc842535bcb7532f23eaab467
                  • Instruction Fuzzy Hash: 1EB092750942488BC601A7E8F4068647BADF298604700019AD959033428A283C14C7A5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 0000000A.00000002.541543403.0000000004B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B30000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_4b30000_sihost.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6498f38417ae9a8e9397626f3a0d53e9eb611c9ab05608dc9feed1e8bebf0d9d
                  • Instruction ID: a825d26a3d4fe2d7b40a41b98a34b062ea51670aa3946421c6a611bbe432748e
                  • Opcode Fuzzy Hash: 6498f38417ae9a8e9397626f3a0d53e9eb611c9ab05608dc9feed1e8bebf0d9d
                  • Instruction Fuzzy Hash: 52A0223008830CABC20022C2B80AB0C3B2CE300A22F008000F30E800800A83282000A2
                  Uniqueness

                  Uniqueness Score: -1.00%