Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2AylrL13DwoqmCT.exe

Overview

General Information

Sample name:2AylrL13DwoqmCT.exe
Analysis ID:1436307
MD5:64e6319165840f7649a1f54abd3f226a
SHA1:6254572c76b925282d6fc5f6d04b610eeb9c2ebf
SHA256:d6e7c231b0aeee159700e68b79eb19d932e851a64a4a82ad1a1c72efc2faa72b
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses FTP
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 2AylrL13DwoqmCT.exe (PID: 6900 cmdline: "C:\Users\user\Desktop\2AylrL13DwoqmCT.exe" MD5: 64E6319165840F7649A1F54ABD3F226A)
    • powershell.exe (PID: 5452 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 3008 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 5756 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • KrzbVJsCi.exe (PID: 5816 cmdline: C:\Users\user\AppData\Roaming\KrzbVJsCi.exe MD5: 64E6319165840F7649A1F54ABD3F226A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.1254083563.0000000005520000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
          • 0x34703:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
          • 0x34775:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
          • 0x347ff:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
          • 0x34891:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
          • 0x348fb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
          • 0x3496d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
          • 0x34a03:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
          • 0x34a93:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          6.2.KrzbVJsCi.exe.2e57480.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            6.2.KrzbVJsCi.exe.5520000.9.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              6.2.KrzbVJsCi.exe.5520000.9.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                6.2.KrzbVJsCi.exe.2e135e4.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  6.2.KrzbVJsCi.exe.2e46808.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    Click to see the 49 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\2AylrL13DwoqmCT.exe", ParentImage: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe, ParentProcessId: 6900, ParentProcessName: 2AylrL13DwoqmCT.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", ProcessId: 5452, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\2AylrL13DwoqmCT.exe", ParentImage: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe, ParentProcessId: 6900, ParentProcessName: 2AylrL13DwoqmCT.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", ProcessId: 5452, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\2AylrL13DwoqmCT.exe", ParentImage: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe, ParentProcessId: 6900, ParentProcessName: 2AylrL13DwoqmCT.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp", ProcessId: 5756, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\2AylrL13DwoqmCT.exe", ParentImage: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe, ParentProcessId: 6900, ParentProcessName: 2AylrL13DwoqmCT.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe", ProcessId: 5452, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\2AylrL13DwoqmCT.exe", ParentImage: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe, ParentProcessId: 6900, ParentProcessName: 2AylrL13DwoqmCT.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp", ProcessId: 5756, ProcessName: schtasks.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 2AylrL13DwoqmCT.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeAvira: detection malicious, Label: HEUR/AGEN.1305452
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeReversingLabs: Detection: 60%
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeVirustotal: Detection: 59%Perma Link
                    Source: 2AylrL13DwoqmCT.exeVirustotal: Detection: 59%Perma Link
                    Source: 2AylrL13DwoqmCT.exeReversingLabs: Detection: 60%
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeJoe Sandbox ML: detected
                    Source: 2AylrL13DwoqmCT.exeJoe Sandbox ML: detected
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewIP Address: 195.252.110.253 195.252.110.253
                    Source: Joe Sandbox ViewASN Name: BEOTEL-AShttpwwwbeotelnetRS BEOTEL-AShttpwwwbeotelnetRS
                    Source: unknownDNS query: name: ip-api.com
                    Source: unknownFTP traffic detected: 195.252.110.253:21 -> 192.168.2.7:49700 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, 2AylrL13DwoqmCT.exe, 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, 2AylrL13DwoqmCT.exe, 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, 2AylrL13DwoqmCT.exe, 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, NmHr1WHWKO.cs.Net Code: _5X3Zzx6JgyO
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, NmHr1WHWKO.cs.Net Code: _5X3Zzx6JgyO
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, NmHr1WHWKO.cs.Net Code: _5X3Zzx6JgyO

                    System Summary

                    barindex
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_014EEFC40_2_014EEFC4
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF77B80_2_05DF77B8
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF77A80_2_05DF77A8
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF93F00_2_05DF93F0
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF93E00_2_05DF93E0
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF73800_2_05DF7380
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF73730_2_05DF7373
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF8FB80_2_05DF8FB8
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF8FAB0_2_05DF8FAB
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF98280_2_05DF9828
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF0BC00_2_05DF0BC0
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_05DF0BB00_2_05DF0BB0
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062A8E580_2_062A8E58
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062AD4E00_2_062AD4E0
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062A08780_2_062A0878
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062A58B00_2_062A58B0
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062AA9810_2_062AA981
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062A6C300_2_062A6C30
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062A24000_2_062A2400
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_062A1D200_2_062A1D20
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E869E00_2_08E869E0
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E8D5180_2_08E8D518
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E806800_2_08E80680
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E812980_2_08E81298
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E8F6500_2_08E8F650
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E8A4180_2_08E8A418
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E809C80_2_08E809C8
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E8C7280_2_08E8C728
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeCode function: 6_2_02BDEFC46_2_02BDEFC4
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3669838888.00000000040E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3669838888.0000000004167000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000000.1189496438.0000000000A0C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDVSq.exe8 vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename90cf818a-462d-43ad-9b06-442ae93cc408.exe4 vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3657402579.0000000000E5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename90cf818a-462d-43ad-9b06-442ae93cc408.exe4 vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exeBinary or memory string: OriginalFilenameDVSq.exe8 vs 2AylrL13DwoqmCT.exe
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: KrzbVJsCi.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, KlaSVIS0ixltNPkyhS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, KV2B7X8Z1o6fKyhy02.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, KV2B7X8Z1o6fKyhy02.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, KV2B7X8Z1o6fKyhy02.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/9@2/2
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile created: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMutant created: \Sessions\1\BaseNamedObjects\mRueOZbwPnpldIORqebpaDEhn
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6692:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5844:120:WilError_03
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile created: C:\Users\user\AppData\Local\Temp\tmpBBC2.tmpJump to behavior
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 2AylrL13DwoqmCT.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 2AylrL13DwoqmCT.exeVirustotal: Detection: 59%
                    Source: 2AylrL13DwoqmCT.exeReversingLabs: Detection: 60%
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile read: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe "C:\Users\user\Desktop\2AylrL13DwoqmCT.exe"
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\KrzbVJsCi.exe C:\Users\user\AppData\Roaming\KrzbVJsCi.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 6.2.KrzbVJsCi.exe.2e57480.1.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                    Source: 6.2.KrzbVJsCi.exe.5520000.9.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, KV2B7X8Z1o6fKyhy02.cs.Net Code: FpMVkX0oWv System.Reflection.Assembly.Load(byte[])
                    Source: 2AylrL13DwoqmCT.exeStatic PE information: section name: .text entropy: 7.975099194385122
                    Source: KrzbVJsCi.exe.0.drStatic PE information: section name: .text entropy: 7.975099194385122
                    Source: 6.2.KrzbVJsCi.exe.2e57480.1.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, cgiECCzxjFhWtfUWsx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'aix0ZQqQ2A', 'RhN02G6g6O', 'qDa0EU0oFx', 'H9P0YynSRC', 'QgX0sthGiE', 'jsY0074L3y', 'UEj0PG3MXs'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, j32Z8eBlHNeoNY1wp3.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bbDojKxar3', 'ykgownG2JI', 'htbozaXFR8', 'N5AUbbvNib', 'AbWU4DvxEC', 'BSFUoKl9lg', 'x1bUUfLKsf', 'xw31Xi4eI9fu5J8IU4k'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, KV2B7X8Z1o6fKyhy02.csHigh entropy of concatenated method names: 'pclUMS6Hxc', 'mb6UpM6AIi', 'LrgUaip1gi', 'eurUBA3fgn', 'kuwU9oxfHR', 'MiuUlk3Ksh', 'PLOUXlK5EN', 'endU8IF89O', 'dPyUgMMiwN', 'sutUOtQYkL'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, F23ZBO4bPTbFsYojED5.csHigh entropy of concatenated method names: 'fWH0tulCeC', 'DEx0RgtGW7', 'VBF0kWgeWm', 'zSb0NFI4V2', 'Vdr0vhRTPo', 'piD0FJ3Rtd', 'OS70doBdmG', 'SpL0SU3D7c', 'fBt0KryL3G', 'AHK0JYmelv'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, gkr2vS3VAweL2pqg1O.csHigh entropy of concatenated method names: 'wHcY6CyZmT', 'gTjYwcrOtr', 'qlIsb3jcdH', 'dQOs4gGUZM', 'HHsYfEXkto', 'FiKYhtAFa7', 'wDbY7pi2xD', 'jgfYWeD9ow', 'kwMYCyXvhk', 'alAYrgJNho'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, Qh2qfjj6p4RCYat27j.csHigh entropy of concatenated method names: 'YGZsekDPZA', 'ORNsmV0A18', 'ddgsLAPaT7', 'cLWsxkSkxf', 'nuUsWRWTDA', 'kZysckgtac', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, oh3xttoD6pxO5MkmB2.csHigh entropy of concatenated method names: 'dcFkGmWhZ', 'gXJNL36ik', 'Ao8FCnAQh', 'ooMdcxpTc', 'clHKPfSl2', 'WGfJGWujO', 'Fnv76FVGwmMavFEkvM', 'AJWZ41qsgK6dhs1iEV', 'F2ZsshstA', 'X86PfATDy'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, KlaSVIS0ixltNPkyhS.csHigh entropy of concatenated method names: 'QqYaW3pw4U', 'tY8aCyKujs', 'o05araQY2y', 'tiIa1vogFB', 'bHRauYND21', 'eb0a3MN41V', 'U89aqMK6MC', 'F5qa6J2bXu', 'rDDajUgiRZ', 'ADCawFd3v7'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, zfQ0q26yIi94kDYsAg.csHigh entropy of concatenated method names: 'bALsp7gkUn', 'LO7saMg46q', 'zmrsB1R8F2', 'kc0s9ixIKc', 'dP2sl8wvx3', 'j7ssXJmfEv', 'Fsrs8gf2dK', 'Nmrsg0QkJa', 'ORysOTWdU5', 'tgJsyIIi9b'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, G6RyO84UyL1Dup5NFBb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'K2PPWCxG6K', 'JptPCW0et8', 'Yu0PrTbL16', 'J9LP191Pw2', 'FuyPuMxR43', 'xO6P3qlD3P', 'XIvPqoZKjB'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, X37ECbJdXblq73DUeq.csHigh entropy of concatenated method names: 'r6m9vK9vZu', 'Bx09dwi8tu', 'SerBLTI0bW', 'WRDBxwZAxW', 'sUEBc8KR4f', 'NoLB5vFWYj', 'F2mBDfpmcN', 'FumBnXwuth', 'GRtBIrGdMC', 'H70BTIDbvN'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, PPIROl4oH3vaJoMkGQS.csHigh entropy of concatenated method names: 'TSZPtH9Xu9', 'MgGPRk4nsi', 'n5iPk7vjGi', 'x1kbSCM2COSvpojGgS5', 'Dse1ZXMCkXM7CVQQMOs', 'KPel2BMt3Wys35JyB8X', 'dfklv2MgK10X4qLRK3o', 'nvaLNUMw55NTfe91d3r', 'jQuZucM3SSx5ruUjJKA'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, GfKFgJa9v75DSJSlfo.csHigh entropy of concatenated method names: 'Dispose', 'UmH4jpPqrD', 'oflomwbDFp', 'PTwJJGsbmW', 'lkf4wQ0q2y', 'Mi94z4kDYs', 'ProcessDialogKey', 'vg7obh2qfj', 'Wp4o4RCYat', 'o7jooeAtBI'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, vDDDNp7TFjfAvOnxcL.csHigh entropy of concatenated method names: 'DHaZSSInQ7', 'NMyZKBsiEw', 'pFTZeEXGQa', 'ltmZmWWBOB', 'KVPZxCC0TW', 'SK2ZcFFWu1', 'kywZDFKbZS', 'ErBZn7Ix0o', 'kLGZTcLhoy', 'cSEZfJaYsv'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, W6g8h6e7tYR17jgKE1.csHigh entropy of concatenated method names: 'jU7lMx5MHe', 'nUllauXOxy', 'G5El9Y15Nt', 't2XlXeYwvj', 'Ybwl8k8MCw', 'iTI9uwMpNi', 'oTi93e4yJC', 'iHb9qjoi01', 'nZw96afgst', 'FKZ9jeADgU'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, qv9BRi1MoyBa0f8v1a.csHigh entropy of concatenated method names: 'ibvYOAWZaB', 'lFrYyLRjij', 'ToString', 'S2kYpribxJ', 'UGbYagAnhd', 'B4NYBVwDdZ', 'lr8Y9LEH7d', 'z0iYl26rI9', 'UeQYXmrqrR', 'BCBY8S8xS6'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, z641QkWfOUKw8fFaph.csHigh entropy of concatenated method names: 'kt32TOceRh', 'Src2hxgULA', 'eAh2WsCeEh', 'RTX2Cepcvi', 'kvY2m3Gno7', 'GkW2LhLe1L', 'wDP2xQn5xW', 'UKj2chMHSy', 'SxD25QSuPX', 'D7A2DgklPJ'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, tLAoC9IvMlWfvf9x8n.csHigh entropy of concatenated method names: 'emFXtn8Evh', 'RTHXRTDbqF', 'JODXkJo9N0', 'CxDXNy7oo5', 'miGXvogjD0', 'HwiXFvBfLO', 'NwuXdV1U8S', 'b4YXS8Mc7J', 'Sw9XK2Nc1q', 'dYXXJDKKjb'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, FAtBIfwcTLYyoirreW.csHigh entropy of concatenated method names: 'OkO04ikKPP', 'Ulx0U6WguU', 'i2P0VeJCuK', 'HOp0pYl8EB', 'Joc0apY2EV', 'cRh094yVoK', 'n410lnafFD', 'wROsqBZNnO', 'u1ts6HWK2q', 'kcEsj1B0wn'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, mfcsEMVoU8nCM8FYxr.csHigh entropy of concatenated method names: 'rf54XlaSVI', 'rix48ltNPk', 'j6j4OM3Wg1', 'fKM4ybj37E', 'VDU42eq66g', 'kh64E7tYR1', 'wH34XSA97wPWcWFAvp', 'wJlvqqSOPVkqeJ4fLi', 'khl44q9NqA', 'QIH4Usbjeb'
                    Source: 6.2.KrzbVJsCi.exe.415c3a0.6.raw.unpack, fNMfXlK6jM3Wg1pKMb.csHigh entropy of concatenated method names: 'Q7UBNpBYbh', 'Ed8BFYvCgl', 'u5HBSCiZ5J', 'a6kBKoKhul', 'hNaB2wLUSb', 'y2kBEh7fIS', 'qGvBYycx6c', 'fv1Bs6JBr0', 'DtnB0TKCXs', 't0pBPI5Qpt'
                    Source: 6.2.KrzbVJsCi.exe.5520000.9.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile created: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 2AylrL13DwoqmCT.exe PID: 6900, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: KrzbVJsCi.exe PID: 5816, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, 2AylrL13DwoqmCT.exe, 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLLESELECT * FROM WIN32_COMPUTERSYSTEM
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: 14E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: 2C50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: 6280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: 7280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: 74C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: 84C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeMemory allocated: 2DF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeMemory allocated: 6280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeMemory allocated: 7280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeMemory allocated: 6280000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599754Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599640Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599531Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599421Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599312Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599203Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599093Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598984Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598765Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598656Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598546Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598424Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598312Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598202Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598093Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597984Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597764Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597656Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597546Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597320Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597202Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597093Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596984Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596765Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596546Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596436Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596327Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595999Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595558Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595343Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595015Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594906Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594796Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594687Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594578Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594468Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWindow / User API: threadDelayed 2124Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWindow / User API: threadDelayed 7726Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6366Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1992Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599754s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -599093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598424s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598202s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -598093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597764s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597320s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597202s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -597093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596436s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596327s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -596109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595999s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595558s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -595015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -594906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -594796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -594687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -594578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe TID: 6856Thread sleep time: -594468s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1000Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3432Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exe TID: 4544Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599754Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599640Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599531Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599421Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599312Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599203Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 599093Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598984Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598765Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598656Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598546Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598424Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598312Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598202Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 598093Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597984Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597764Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597656Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597546Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597320Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597202Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 597093Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596984Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596875Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596765Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596546Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596436Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596327Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595999Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595558Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595343Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 595015Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594906Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594796Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594687Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594578Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeThread delayed: delay time: 594468Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: vmware
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: 2AylrL13DwoqmCT.exe, 00000000.00000002.3671821385.00000000056D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeCode function: 0_2_08E82410 CheckRemoteDebuggerPresent,0_2_08E82410
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe"
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeQueries volume information: C:\Users\user\Desktop\2AylrL13DwoqmCT.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeQueries volume information: C:\Users\user\AppData\Roaming\KrzbVJsCi.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KrzbVJsCi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 2AylrL13DwoqmCT.exe PID: 6900, type: MEMORYSTR
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e57480.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.5520000.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.5520000.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e135e4.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e46808.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e57480.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e46808.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.309b62c.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.3099614.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.30985fc.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1254083563.0000000005520000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1252121361.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1252121361.000000000305E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\2AylrL13DwoqmCT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 2AylrL13DwoqmCT.exe PID: 6900, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.8dc0000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.407e958.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.4042b38.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 2AylrL13DwoqmCT.exe PID: 6900, type: MEMORYSTR
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e57480.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.5520000.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.5520000.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e135e4.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e46808.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e57480.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.2e46808.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.309b62c.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.3099614.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.KrzbVJsCi.exe.30985fc.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d563cc.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d67474.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.2AylrL13DwoqmCT.exe.2d23110.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.1254083563.0000000005520000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1252121361.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1252121361.000000000305E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    23
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    1
                    Obfuscated Files or Information
                    Security Account Manager521
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets151
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                    Virtualization/Sandbox Evasion
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1436307 Sample: 2AylrL13DwoqmCT.exe Startdate: 04/05/2024 Architecture: WINDOWS Score: 100 30 ftp.jeepcommerce.rs 2->30 32 ip-api.com 2->32 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 12 other signatures 2->44 8 2AylrL13DwoqmCT.exe 15 6 2->8         started        13 KrzbVJsCi.exe 3 2->13         started        signatures3 process4 dnsIp5 34 ftp.jeepcommerce.rs 195.252.110.253, 21, 49700 BEOTEL-AShttpwwwbeotelnetRS Serbia 8->34 36 ip-api.com 208.95.112.1, 49699, 80 TUT-ASUS United States 8->36 26 C:\Users\user\AppData\Roaming\KrzbVJsCi.exe, PE32 8->26 dropped 28 C:\Users\user\AppData\Local\...\tmpBBC2.tmp, XML 8->28 dropped 46 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->46 48 Tries to steal Mail credentials (via file / registry access) 8->48 50 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->50 58 5 other signatures 8->58 15 powershell.exe 23 8->15         started        18 schtasks.exe 1 8->18         started        52 Antivirus detection for dropped file 13->52 54 Multi AV Scanner detection for dropped file 13->54 56 Machine Learning detection for dropped file 13->56 file6 signatures7 process8 signatures9 60 Loading BitLocker PowerShell Module 15->60 20 WmiPrvSE.exe 15->20         started        22 conhost.exe 15->22         started        24 conhost.exe 18->24         started        process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    2AylrL13DwoqmCT.exe60%VirustotalBrowse
                    2AylrL13DwoqmCT.exe61%ReversingLabsWin32.Trojan.SnakeKeyLogger
                    2AylrL13DwoqmCT.exe100%AviraHEUR/AGEN.1305452
                    2AylrL13DwoqmCT.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\KrzbVJsCi.exe100%AviraHEUR/AGEN.1305452
                    C:\Users\user\AppData\Roaming\KrzbVJsCi.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\KrzbVJsCi.exe61%ReversingLabsWin32.Trojan.SnakeKeyLogger
                    C:\Users\user\AppData\Roaming\KrzbVJsCi.exe60%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    ftp.jeepcommerce.rs0%VirustotalBrowse
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    ftp.jeepcommerce.rs
                    195.252.110.253
                    truetrueunknown
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://account.dyn.com/2AylrL13DwoqmCT.exe, 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, 2AylrL13DwoqmCT.exe, 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name2AylrL13DwoqmCT.exe, 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            195.252.110.253
                            ftp.jeepcommerce.rsSerbia
                            6700BEOTEL-AShttpwwwbeotelnetRStrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1436307
                            Start date and time:2024-05-04 10:06:12 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 9m 9s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:22
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:2AylrL13DwoqmCT.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@9/9@2/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 198
                            • Number of non-executed functions: 17
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            TimeTypeDescription
                            10:07:00API Interceptor6561426x Sleep call for process: 2AylrL13DwoqmCT.exe modified
                            10:07:03Task SchedulerRun new task: KrzbVJsCi path: C:\Users\user\AppData\Roaming\KrzbVJsCi.exe
                            10:07:04API Interceptor13x Sleep call for process: powershell.exe modified
                            10:07:05API Interceptor1x Sleep call for process: KrzbVJsCi.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1DHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            43643456.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            Sipari#U015f.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            http://www.open-sora.orgGet hashmaliciousExela Stealer, Growtopia, Python StealerBrowse
                            • ip-api.com/json
                            nXaujG6G1F.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                            • ip-api.com/json/?fields=225545
                            NFs_98776.msiGet hashmaliciousVMdetectBrowse
                            • ip-api.com/json/
                            195.252.110.253x4WR1Me6BUaPR7j.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              37#U0e2d.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                ooMNej81u4XDt83.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Purchase Order1.exeGet hashmaliciousAgentTeslaBrowse
                                    6000507958.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      lGaZ58sYpVmY9rn.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        SecuriteInfo.com.Win32.Malware-gen.9746.16728.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          179XakWwrt2H1Xx.exeGet hashmaliciousAgentTeslaBrowse
                                            REMITTANCE ADVICE IF01200022823418 Match 2024.exeGet hashmaliciousAgentTeslaBrowse
                                              POTWIERDZENIE_TRANSAKCJI_20240418145856.exeGet hashmaliciousGuLoaderBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ip-api.comDHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                43643456.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                Sipari#U015f.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                http://www.open-sora.orgGet hashmaliciousExela Stealer, Growtopia, Python StealerBrowse
                                                • 208.95.112.1
                                                nXaujG6G1F.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                                • 208.95.112.1
                                                NFs_98776.msiGet hashmaliciousVMdetectBrowse
                                                • 208.95.112.1
                                                ftp.jeepcommerce.rsx4WR1Me6BUaPR7j.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                37#U0e2d.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                ooMNej81u4XDt83.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                Purchase Order1.exeGet hashmaliciousAgentTeslaBrowse
                                                • 195.252.110.253
                                                lGaZ58sYpVmY9rn.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                179XakWwrt2H1Xx.exeGet hashmaliciousAgentTeslaBrowse
                                                • 195.252.110.253
                                                REMITTANCE ADVICE IF01200022823418 Match 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                • 195.252.110.253
                                                Invptapayment19032024.exeGet hashmaliciousAgentTeslaBrowse
                                                • 195.252.110.253
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                TUT-ASUSDHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                43643456.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                Sipari#U015f.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                http://www.open-sora.orgGet hashmaliciousExela Stealer, Growtopia, Python StealerBrowse
                                                • 208.95.112.1
                                                nXaujG6G1F.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                                                • 208.95.112.1
                                                NFs_98776.msiGet hashmaliciousVMdetectBrowse
                                                • 208.95.112.1
                                                BEOTEL-AShttpwwwbeotelnetRSx4WR1Me6BUaPR7j.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                37#U0e2d.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                ooMNej81u4XDt83.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                Purchase Order1.exeGet hashmaliciousAgentTeslaBrowse
                                                • 195.252.110.253
                                                6000507958.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 195.252.110.253
                                                lGaZ58sYpVmY9rn.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 195.252.110.253
                                                SecuriteInfo.com.Win32.Malware-gen.9746.16728.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 195.252.110.253
                                                179XakWwrt2H1Xx.exeGet hashmaliciousAgentTeslaBrowse
                                                • 195.252.110.253
                                                REMITTANCE ADVICE IF01200022823418 Match 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                • 195.252.110.253
                                                POTWIERDZENIE_TRANSAKCJI_20240418145856.exeGet hashmaliciousGuLoaderBrowse
                                                • 195.252.110.253
                                                No context
                                                No context
                                                Process:C:\Users\user\AppData\Roaming\KrzbVJsCi.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2232
                                                Entropy (8bit):5.380111671822685
                                                Encrypted:false
                                                SSDEEP:48:wWSU4xympjgZ9tz4RIoUl8NPZHUl7u1iMuge//ZM0N1Ryus:wLHxvCZfIfSKRHmOugroPs
                                                MD5:A6CB1EC705D71A125C1DC029711D86D1
                                                SHA1:8E1943AA5F9D5481ED55DF5FFF87765412BA2D00
                                                SHA-256:EB8D755EE316C383B0B9D2A4C94AF3DD431189B3567A1DA40673DFC4A7592C79
                                                SHA-512:8CB955A492972798FCC747F0FFCC0A49A93AA9AE76BFA2A3FF206982B03339992CF9C160E92C52641902667E10FBD95999D5D8DE6906289B0580202C84001314
                                                Malicious:false
                                                Reputation:low
                                                Preview:@...e.................................X..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Users\user\Desktop\2AylrL13DwoqmCT.exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1603
                                                Entropy (8bit):5.127756174104479
                                                Encrypted:false
                                                SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtpxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTfv
                                                MD5:70852FA3788F7BEF8A629522FA2826DD
                                                SHA1:6F0B31D36B9C5F28207439AF4EC18F7933D1F7F4
                                                SHA-256:681597132C03CEAE946691EA98B24B906109433D7B81362ED36200010BC39E79
                                                SHA-512:BB03817B80CE01789EAE8802D0ED71016BA2CD1689CB185B846B45DA3B1E33D1999C1BAAE0D429D9F6493FEDCF5BAF1BAEE3828B8467E0BBEC66CEF882C8DC57
                                                Malicious:true
                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                Process:C:\Users\user\Desktop\2AylrL13DwoqmCT.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):706560
                                                Entropy (8bit):7.956653044118368
                                                Encrypted:false
                                                SSDEEP:12288:F3/T3/fVrTtK3/eKGYt+rTNTCRRAuBE2MW62TzaAzvHgC8M/lJXry43/o3/:FrXVrTtKWUiNUylCaADf/w
                                                MD5:64E6319165840F7649A1F54ABD3F226A
                                                SHA1:6254572C76B925282D6FC5F6D04B610EEB9C2EBF
                                                SHA-256:D6E7C231B0AEEE159700E68B79EB19D932E851A64A4A82AD1A1C72EFC2FAA72B
                                                SHA-512:E01139A68C72571F37FA302F66232D2957F223D8C90D97EA8D9FC42EC69F11763D00AB1FD07A58624F49B763C07EF66D05ADC7497815344D58D02F6D5A7231A3
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 61%
                                                • Antivirus: Virustotal, Detection: 60%, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....a3f..............0......8........... ........@.. ....................... ............@.................................l...O........,........................................................................... ............... ..H............text....... ...................... ..`.rsrc....,.......0..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\2AylrL13DwoqmCT.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:false
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.956653044118368
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:2AylrL13DwoqmCT.exe
                                                File size:706'560 bytes
                                                MD5:64e6319165840f7649a1f54abd3f226a
                                                SHA1:6254572c76b925282d6fc5f6d04b610eeb9c2ebf
                                                SHA256:d6e7c231b0aeee159700e68b79eb19d932e851a64a4a82ad1a1c72efc2faa72b
                                                SHA512:e01139a68c72571f37fa302f66232d2957f223d8c90d97ea8d9fc42ec69f11763d00ab1fd07a58624f49b763c07ef66d05adc7497815344d58d02f6d5a7231a3
                                                SSDEEP:12288:F3/T3/fVrTtK3/eKGYt+rTNTCRRAuBE2MW62TzaAzvHgC8M/lJXry43/o3/:FrXVrTtKWUiNUylCaADf/w
                                                TLSH:73E4228573F84B2DD00F93F5142ACE4243F639966864E9597F8A88DA5DFEF5B0B0020B
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....a3f..............0......8........... ........@.. ....................... ............@................................
                                                Icon Hash:0773f1fcfccc6113
                                                Entrypoint:0x4aa4be
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x66336112 [Thu May 2 09:46:58 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                aaa
                                                inc edi
                                                aaa
                                                dec eax
                                                xor eax, 42000000h
                                                xor eax, 4E343531h
                                                xor eax, 32414939h
                                                dec ecx
                                                aaa
                                                aaa
                                                inc ebp
                                                xor al, 56h
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xaa46c0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x2ce4.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xa84e40xa88005e91b8cb02257ef304d898ea76491485False0.9610693504265578data7.975099194385122IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xac0000x2ce40x3000632beab92483815240617853001b913eFalse0.8715006510416666data7.429818229594035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xb00000xc0x800d65664eabbf1c34da54e98038dc1aab7False0.01611328125data0.03037337037012526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xac1000x26cdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9980871841336958
                                                RT_GROUP_ICON0xae7e00x14data1.05
                                                RT_VERSION0xae8040x2e0data0.44565217391304346
                                                RT_MANIFEST0xaeaf40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSource PortDest PortSource IPDest IP
                                                May 4, 2024 10:07:05.748845100 CEST4969980192.168.2.7208.95.112.1
                                                May 4, 2024 10:07:05.908523083 CEST8049699208.95.112.1192.168.2.7
                                                May 4, 2024 10:07:05.908626080 CEST4969980192.168.2.7208.95.112.1
                                                May 4, 2024 10:07:05.909607887 CEST4969980192.168.2.7208.95.112.1
                                                May 4, 2024 10:07:06.071086884 CEST8049699208.95.112.1192.168.2.7
                                                May 4, 2024 10:07:06.136487007 CEST4969980192.168.2.7208.95.112.1
                                                May 4, 2024 10:07:07.869769096 CEST4970021192.168.2.7195.252.110.253
                                                May 4, 2024 10:07:08.199057102 CEST2149700195.252.110.253192.168.2.7
                                                May 4, 2024 10:07:08.199167013 CEST4970021192.168.2.7195.252.110.253
                                                May 4, 2024 10:07:08.204736948 CEST4970021192.168.2.7195.252.110.253
                                                May 4, 2024 10:07:08.529671907 CEST2149700195.252.110.253192.168.2.7
                                                May 4, 2024 10:07:08.529911995 CEST4970021192.168.2.7195.252.110.253
                                                May 4, 2024 10:07:08.533653975 CEST2149700195.252.110.253192.168.2.7
                                                May 4, 2024 10:07:08.533714056 CEST4970021192.168.2.7195.252.110.253
                                                May 4, 2024 10:07:08.534681082 CEST2149700195.252.110.253192.168.2.7
                                                May 4, 2024 10:07:08.538162947 CEST4970021192.168.2.7195.252.110.253
                                                May 4, 2024 10:07:37.273715019 CEST8049699208.95.112.1192.168.2.7
                                                TimestampSource PortDest PortSource IPDest IP
                                                May 4, 2024 10:07:05.581926107 CEST5164353192.168.2.71.1.1.1
                                                May 4, 2024 10:07:05.743257046 CEST53516431.1.1.1192.168.2.7
                                                May 4, 2024 10:07:07.197041035 CEST6019053192.168.2.71.1.1.1
                                                May 4, 2024 10:07:07.868992090 CEST53601901.1.1.1192.168.2.7
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                May 4, 2024 10:07:05.581926107 CEST192.168.2.71.1.1.10x11b0Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                May 4, 2024 10:07:07.197041035 CEST192.168.2.71.1.1.10xef83Standard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                May 4, 2024 10:07:05.743257046 CEST1.1.1.1192.168.2.70x11b0No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                May 4, 2024 10:07:07.868992090 CEST1.1.1.1192.168.2.70xef83No error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                                                • ip-api.com
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.749699208.95.112.1806900C:\Users\user\Desktop\2AylrL13DwoqmCT.exe
                                                TimestampBytes transferredDirectionData
                                                May 4, 2024 10:07:05.909607887 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                Host: ip-api.com
                                                Connection: Keep-Alive
                                                May 4, 2024 10:07:06.071086884 CEST174INHTTP/1.1 200 OK
                                                Date: Sat, 04 May 2024 08:07:05 GMT
                                                Content-Type: text/plain; charset=utf-8
                                                Content-Length: 5
                                                Access-Control-Allow-Origin: *
                                                X-Ttl: 60
                                                X-Rl: 44
                                                Data Raw: 74 72 75 65 0a
                                                Data Ascii: true


                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                May 4, 2024 10:07:08.529671907 CEST2149700195.252.110.253192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21.
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21.220-This is a private system - No anonymous login
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 09:07. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                May 4, 2024 10:07:08.533653975 CEST2149700195.252.110.253192.168.2.7220 Logout.

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:10:07:00
                                                Start date:04/05/2024
                                                Path:C:\Users\user\Desktop\2AylrL13DwoqmCT.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\2AylrL13DwoqmCT.exe"
                                                Imagebase:0x960000
                                                File size:706'560 bytes
                                                MD5 hash:64E6319165840F7649A1F54ABD3F226A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.3674919885.0000000008DC0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.3669838888.0000000004042000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.3665392340.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Target ID:2
                                                Start time:10:07:01
                                                Start date:04/05/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KrzbVJsCi.exe"
                                                Imagebase:0x370000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:10:07:01
                                                Start date:04/05/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:10:07:01
                                                Start date:04/05/2024
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KrzbVJsCi" /XML "C:\Users\user\AppData\Local\Temp\tmpBBC2.tmp"
                                                Imagebase:0x4b0000
                                                File size:187'904 bytes
                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:10:07:01
                                                Start date:04/05/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:10:07:04
                                                Start date:04/05/2024
                                                Path:C:\Users\user\AppData\Roaming\KrzbVJsCi.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\KrzbVJsCi.exe
                                                Imagebase:0x940000
                                                File size:706'560 bytes
                                                MD5 hash:64E6319165840F7649A1F54ABD3F226A
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.1254083563.0000000005520000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.1252121361.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.1252121361.000000000305E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 61%, ReversingLabs
                                                • Detection: 60%, Virustotal, Browse
                                                Reputation:low
                                                Has exited:true

                                                Target ID:7
                                                Start time:10:07:05
                                                Start date:04/05/2024
                                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                Imagebase:0x7ff75da10000
                                                File size:496'640 bytes
                                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                Has elevated privileges:true
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:11.4%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:3.3%
                                                  Total number of Nodes:180
                                                  Total number of Limit Nodes:19
                                                  execution_graph 50202 14e4668 50203 14e467f 50202->50203 50204 14e468b 50203->50204 50208 14e4798 50203->50208 50213 14e4238 50204->50213 50206 14e46aa 50209 14e47bd 50208->50209 50217 14e4898 50209->50217 50221 14e48a8 50209->50221 50214 14e4243 50213->50214 50229 14e5ca4 50214->50229 50216 14e70f8 50216->50206 50219 14e48a8 50217->50219 50218 14e49ac 50218->50218 50219->50218 50225 14e4508 50219->50225 50222 14e48cf 50221->50222 50223 14e49ac 50222->50223 50224 14e4508 CreateActCtxA 50222->50224 50223->50223 50224->50223 50226 14e5938 CreateActCtxA 50225->50226 50228 14e59fb 50226->50228 50228->50228 50230 14e5caf 50229->50230 50233 14e5cc4 50230->50233 50232 14e719d 50232->50216 50234 14e5ccf 50233->50234 50237 14e5cf4 50234->50237 50236 14e727a 50236->50232 50238 14e5cff 50237->50238 50239 14e5d24 3 API calls 50238->50239 50240 14e736d 50239->50240 50240->50236 50255 8e82410 50256 8e82454 CheckRemoteDebuggerPresent 50255->50256 50257 8e82496 50256->50257 50241 14ed4e0 50242 14ed526 50241->50242 50246 14ed6c0 50242->50246 50249 14ed6b0 50242->50249 50243 14ed613 50252 14ed07c 50246->50252 50250 14ed6ee 50249->50250 50251 14ed07c DuplicateHandle 50249->50251 50250->50243 50251->50250 50253 14ed728 DuplicateHandle 50252->50253 50254 14ed6ee 50253->50254 50254->50243 50024 5dfd950 50025 5dfd956 50024->50025 50026 5dfda23 50025->50026 50031 5dfe100 50025->50031 50037 62ab848 50025->50037 50041 14ed421 50025->50041 50046 62ab838 50025->50046 50033 5dfe116 50031->50033 50032 5dfe22e 50032->50025 50033->50032 50050 8e82d88 50033->50050 50056 8e82d43 50033->50056 50062 8e83e81 50033->50062 50038 62ab857 50037->50038 50112 62aa72c 50038->50112 50042 14ed3f7 50041->50042 50045 14ed43e 50041->50045 50044 14ed40f 50042->50044 50132 14ecfb4 50042->50132 50044->50025 50045->50025 50047 62ab857 50046->50047 50048 62aa72c DispatchMessageW 50047->50048 50049 62ab877 50048->50049 50049->50025 50051 8e82da3 50050->50051 50067 8e82e38 50051->50067 50072 8e82f75 50051->50072 50077 8e82f7e 50051->50077 50057 8e82d4d 50056->50057 50059 8e82e38 EnumThreadWindows 50057->50059 50060 8e82f7e EnumThreadWindows 50057->50060 50061 8e82f75 EnumThreadWindows 50057->50061 50058 8e82df0 50058->50033 50059->50058 50060->50058 50061->50058 50063 8e83e8b 50062->50063 50064 8e83f41 50063->50064 50104 62aa000 50063->50104 50108 62aa010 50063->50108 50064->50033 50068 8e82e71 50067->50068 50069 8e82e8a 50068->50069 50082 8e83048 50068->50082 50086 8e83038 50068->50086 50074 8e82f64 50072->50074 50073 8e82fc1 50074->50073 50075 8e83048 EnumThreadWindows 50074->50075 50076 8e83038 EnumThreadWindows 50074->50076 50075->50073 50076->50073 50078 8e82f64 50077->50078 50079 8e82fc1 50078->50079 50080 8e83048 EnumThreadWindows 50078->50080 50081 8e83038 EnumThreadWindows 50078->50081 50080->50079 50081->50079 50085 8e83077 50082->50085 50083 8e8310c 50085->50083 50091 8e82a04 50085->50091 50087 8e83009 50086->50087 50090 8e8303b 50086->50090 50087->50069 50088 8e83011 50088->50069 50089 8e82a04 EnumThreadWindows 50089->50090 50090->50088 50090->50089 50093 8e82a0f 50091->50093 50092 8e8321b 50093->50092 50095 8e82bd8 50093->50095 50096 8e82be3 50095->50096 50097 8e834d3 50096->50097 50099 8e835e8 50096->50099 50097->50092 50100 8e835b9 50099->50100 50102 8e835eb EnumThreadWindows 50099->50102 50100->50097 50103 8e83670 50102->50103 50103->50097 50106 62aa00e 50104->50106 50105 62aa23a 50105->50064 50106->50105 50107 62aa253 GlobalMemoryStatusEx 50106->50107 50107->50106 50110 62aa01e 50108->50110 50109 62aa23a 50109->50064 50110->50109 50111 62aa253 GlobalMemoryStatusEx 50110->50111 50111->50110 50113 62aa737 50112->50113 50116 62aa76c 50113->50116 50115 62ab93c 50115->50115 50117 62aa777 50116->50117 50118 62abbe3 50117->50118 50121 62ad4e0 50117->50121 50125 62ad4d0 50117->50125 50118->50115 50123 62ad545 50121->50123 50122 62ad592 50122->50118 50123->50122 50129 62abf8c 50123->50129 50127 62ad545 50125->50127 50126 62ad592 50126->50118 50127->50126 50128 62abf8c DispatchMessageW 50127->50128 50128->50127 50130 62ae1e0 DispatchMessageW 50129->50130 50131 62ae24c 50130->50131 50131->50123 50133 14ecfb9 50132->50133 50135 14edd20 50133->50135 50136 14ed0dc 50133->50136 50135->50135 50137 14ed0e7 50136->50137 50140 14e5d24 50137->50140 50139 14edd8f 50139->50135 50141 14e5d2f 50140->50141 50143 14e866b 50141->50143 50147 14ead18 50141->50147 50142 14e86a9 50142->50139 50143->50142 50151 14ece10 50143->50151 50156 14ece00 50143->50156 50161 14ead3f 50147->50161 50166 14ead50 50147->50166 50148 14ead2e 50148->50143 50152 14ece31 50151->50152 50153 14ece55 50152->50153 50155 14ed421 3 API calls 50152->50155 50198 14ed3c8 50152->50198 50153->50142 50155->50153 50157 14ece31 50156->50157 50158 14ece55 50157->50158 50159 14ed3c8 3 API calls 50157->50159 50160 14ed421 3 API calls 50157->50160 50158->50142 50159->50158 50160->50158 50162 14ead50 50161->50162 50170 14eae48 50162->50170 50178 14eae37 50162->50178 50163 14ead5f 50163->50148 50168 14eae48 2 API calls 50166->50168 50169 14eae37 2 API calls 50166->50169 50167 14ead5f 50167->50148 50168->50167 50169->50167 50171 14eae59 50170->50171 50172 14eae7c 50170->50172 50171->50172 50186 14eb0d2 50171->50186 50190 14eb0e0 50171->50190 50172->50163 50173 14eae74 50173->50172 50174 14eb080 GetModuleHandleW 50173->50174 50175 14eb0ad 50174->50175 50175->50163 50179 14eae59 50178->50179 50180 14eae7c 50178->50180 50179->50180 50184 14eb0d2 LoadLibraryExW 50179->50184 50185 14eb0e0 LoadLibraryExW 50179->50185 50180->50163 50181 14eae74 50181->50180 50182 14eb080 GetModuleHandleW 50181->50182 50183 14eb0ad 50182->50183 50183->50163 50184->50181 50185->50181 50188 14eb0e0 50186->50188 50187 14eb119 50187->50173 50188->50187 50194 14ea228 50188->50194 50191 14eb0f4 50190->50191 50192 14ea228 LoadLibraryExW 50191->50192 50193 14eb119 50191->50193 50192->50193 50193->50173 50195 14eb6c0 LoadLibraryExW 50194->50195 50197 14eb739 50195->50197 50197->50187 50199 14ed3d5 50198->50199 50200 14ed40f 50199->50200 50201 14ecfb4 3 API calls 50199->50201 50200->50153 50201->50200

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 419 8e8d518-8e8d539 420 8e8d53b-8e8d53e 419->420 421 8e8dcdf-8e8dce2 420->421 422 8e8d544-8e8d563 420->422 423 8e8dd08-8e8dd0a 421->423 424 8e8dce4-8e8dd03 421->424 431 8e8d57c-8e8d586 422->431 432 8e8d565-8e8d568 422->432 426 8e8dd0c 423->426 427 8e8dd11-8e8dd14 423->427 424->423 426->427 427->420 428 8e8dd1a-8e8dd23 427->428 436 8e8d58c-8e8d59d call 8e8a0ec 431->436 432->431 434 8e8d56a-8e8d57a 432->434 434->436 439 8e8d5a2-8e8d5a7 436->439 440 8e8d5a9-8e8d5af 439->440 441 8e8d5b4-8e8d891 439->441 440->428 462 8e8dcd1-8e8dcde 441->462 463 8e8d897-8e8d946 441->463 472 8e8d948-8e8d96d 463->472 473 8e8d96f 463->473 475 8e8d978-8e8d98b call 8e8a0f8 472->475 473->475 478 8e8dcb8-8e8dcc4 475->478 479 8e8d991-8e8d9b3 call 8e8a104 475->479 478->463 480 8e8dcca 478->480 479->478 483 8e8d9b9-8e8d9c3 479->483 480->462 483->478 484 8e8d9c9-8e8d9d4 483->484 484->478 485 8e8d9da-8e8dab0 484->485 497 8e8dabe-8e8daee 485->497 498 8e8dab2-8e8dab4 485->498 502 8e8dafc-8e8db08 497->502 503 8e8daf0-8e8daf2 497->503 498->497 504 8e8db68-8e8db6c 502->504 505 8e8db0a-8e8db0e 502->505 503->502 507 8e8dca9-8e8dcb2 504->507 508 8e8db72-8e8dbae 504->508 505->504 506 8e8db10-8e8db3a 505->506 515 8e8db48-8e8db65 call 8e8a110 506->515 516 8e8db3c-8e8db3e 506->516 507->478 507->485 519 8e8dbbc-8e8dbca 508->519 520 8e8dbb0-8e8dbb2 508->520 515->504 516->515 523 8e8dbcc-8e8dbd7 519->523 524 8e8dbe1-8e8dbec 519->524 520->519 523->524 529 8e8dbd9 523->529 527 8e8dbee-8e8dbf4 524->527 528 8e8dc04-8e8dc15 524->528 530 8e8dbf8-8e8dbfa 527->530 531 8e8dbf6 527->531 533 8e8dc2d-8e8dc39 528->533 534 8e8dc17-8e8dc1d 528->534 529->524 530->528 531->528 538 8e8dc3b-8e8dc41 533->538 539 8e8dc51-8e8dca2 533->539 535 8e8dc1f 534->535 536 8e8dc21-8e8dc23 534->536 535->533 536->533 540 8e8dc43 538->540 541 8e8dc45-8e8dc47 538->541 539->507 540->539 541->539
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q$$q$$q
                                                  • API String ID: 0-2069967915
                                                  • Opcode ID: 2c1141e6c0cab7ff321234393dac66d58cfec27e6a67bb5c5464f664e5f70e17
                                                  • Instruction ID: 4e2aed37ddb506d74c6e7faa02b9a544bf4e24fffda54949ffa35d082d180694
                                                  • Opcode Fuzzy Hash: 2c1141e6c0cab7ff321234393dac66d58cfec27e6a67bb5c5464f664e5f70e17
                                                  • Instruction Fuzzy Hash: 27322E31E10719CFCB14EF65D89069DF7B2FF89301F6496AAD409AB254EB70E985CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 879 62aa981-62aa9a2 880 62aaa06-62aaa0d 879->880 881 62aa9a4-62aa9d1 call 62aa4c8 call 62a648c 879->881 888 62aa9d6-62aa9e3 881->888 890 62aaa0e-62aaa75 888->890 891 62aa9e5-62aa9fe 888->891 901 62aaa7e-62aaa8e 890->901 902 62aaa77-62aaa79 890->902 891->880 904 62aaa90 901->904 905 62aaa95-62aaaa5 901->905 903 62aad1d-62aad24 902->903 904->903 907 62aaaab-62aaab9 905->907 908 62aad04-62aad12 905->908 912 62aad25-62aad9e 907->912 913 62aaabf 907->913 911 62aad14-62aad18 call 62a1330 908->911 908->912 911->903 913->912 915 62aab2a-62aab4b 913->915 916 62aac89-62aacb5 913->916 917 62aabef-62aac17 913->917 918 62aabc2-62aabea 913->918 919 62aab03-62aab25 913->919 920 62aaac6-62aaad8 913->920 921 62aacf8-62aad02 913->921 922 62aac5e-62aac84 913->922 923 62aab9c-62aabbd 913->923 924 62aac1c-62aac59 913->924 925 62aaadd-62aaafe 913->925 926 62aab50-62aab71 913->926 927 62aab76-62aab97 913->927 928 62aacb7-62aacd2 913->928 929 62aacd4-62aacf6 913->929 915->903 916->903 917->903 918->903 919->903 920->903 921->903 922->903 923->903 924->903 925->903 926->903 927->903 928->903 929->903
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xq$$q
                                                  • API String ID: 0-855381642
                                                  • Opcode ID: c0676aca6e0d2a57ef7fb1b8b78f86ce0ec6434ba27afc9e97ff564719444f29
                                                  • Instruction ID: 42ba127b20fbb571e03c874731812478a720ca1af4f89191a62b358c9e24970e
                                                  • Opcode Fuzzy Hash: c0676aca6e0d2a57ef7fb1b8b78f86ce0ec6434ba27afc9e97ff564719444f29
                                                  • Instruction Fuzzy Hash: B5B1B334B143088FDB58AB75985467E7BB7BFC8301B15842EE897D7289CE788C06CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 53ec0c9c6097b36126600093bbf69275886e64c58787bb633dc56848216b2dde
                                                  • Instruction ID: e970a574bf5bc3c0918df646031bafe99075c7324444998f2d6539cf88ca8189
                                                  • Opcode Fuzzy Hash: 53ec0c9c6097b36126600093bbf69275886e64c58787bb633dc56848216b2dde
                                                  • Instruction Fuzzy Hash: 9653D631C10B1ACADB51EF68C8805A9F7B1EF99300F15D79AE45C7B121EB70AAD5CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1651 8e8f650-8e8f66e 1652 8e8f670-8e8f673 1651->1652 1653 8e8f690-8e8f693 1652->1653 1654 8e8f675-8e8f68b 1652->1654 1655 8e8f6a4-8e8f6a7 1653->1655 1656 8e8f695-8e8f699 1653->1656 1654->1653 1660 8e8f6a9-8e8f6ae 1655->1660 1661 8e8f6b1-8e8f6b4 1655->1661 1658 8e8f69f 1656->1658 1659 8e8f834-8e8f841 1656->1659 1658->1655 1660->1661 1662 8e8f6d3-8e8f6d6 1661->1662 1663 8e8f6b6-8e8f6c4 1661->1663 1664 8e8f6d8-8e8f6d9 1662->1664 1665 8e8f6de-8e8f6e1 1662->1665 1666 8e8f6cb-8e8f6ce 1663->1666 1664->1665 1667 8e8f6ee-8e8f6f1 1665->1667 1668 8e8f6e3-8e8f6e9 1665->1668 1666->1662 1669 8e8f6fb-8e8f6fe 1667->1669 1670 8e8f6f3-8e8f6f6 1667->1670 1668->1667 1671 8e8f71a-8e8f71d 1669->1671 1672 8e8f700-8e8f715 1669->1672 1670->1669 1673 8e8f71f-8e8f730 1671->1673 1674 8e8f735-8e8f738 1671->1674 1672->1671 1673->1674 1676 8e8f73a-8e8f757 1674->1676 1677 8e8f75c-8e8f75f 1674->1677 1676->1677 1678 8e8f7a0-8e8f7a3 1677->1678 1679 8e8f761-8e8f76a 1677->1679 1683 8e8f7b3-8e8f7b6 1678->1683 1684 8e8f7a5-8e8f7a8 1678->1684 1681 8e8f770-8e8f77b 1679->1681 1682 8e8f842-8e8f86b 1679->1682 1681->1682 1686 8e8f781-8e8f791 1681->1686 1698 8e8f875-8e8f878 1682->1698 1688 8e8f7b8-8e8f7c8 1683->1688 1689 8e8f7cd-8e8f7d0 1683->1689 1684->1663 1687 8e8f7ae 1684->1687 1686->1682 1690 8e8f797-8e8f79b 1686->1690 1687->1683 1688->1689 1691 8e8f80e-8e8f817 1689->1691 1692 8e8f7d2-8e8f7d5 1689->1692 1690->1678 1691->1679 1695 8e8f81d 1691->1695 1692->1684 1697 8e8f7d7-8e8f7da 1692->1697 1699 8e8f822-8e8f824 1695->1699 1700 8e8f7dc-8e8f7e5 1697->1700 1701 8e8f7e6-8e8f7e9 1697->1701 1702 8e8f87a-8e8f881 1698->1702 1703 8e8f882-8e8f885 1698->1703 1706 8e8f82b-8e8f82e 1699->1706 1707 8e8f826 1699->1707 1704 8e8f7eb-8e8f7f1 1701->1704 1705 8e8f7fc-8e8f7ff 1701->1705 1709 8e8f8a7-8e8f8aa 1703->1709 1710 8e8f887-8e8f88b 1703->1710 1704->1664 1708 8e8f7f7 1704->1708 1711 8e8f809-8e8f80c 1705->1711 1712 8e8f801-8e8f806 1705->1712 1706->1652 1706->1659 1707->1706 1708->1705 1715 8e8f8cc-8e8f8cf 1709->1715 1716 8e8f8ac-8e8f8b0 1709->1716 1713 8e8f96a-8e8f9a4 1710->1713 1714 8e8f891-8e8f899 1710->1714 1711->1691 1711->1699 1712->1711 1728 8e8f9a6-8e8f9a9 1713->1728 1714->1713 1717 8e8f89f-8e8f8a2 1714->1717 1719 8e8f8f1-8e8f8f4 1715->1719 1720 8e8f8d1-8e8f8d5 1715->1720 1716->1713 1718 8e8f8b6-8e8f8be 1716->1718 1717->1709 1718->1713 1722 8e8f8c4-8e8f8c7 1718->1722 1724 8e8f905-8e8f908 1719->1724 1725 8e8f8f6-8e8f900 1719->1725 1720->1713 1723 8e8f8db-8e8f8e3 1720->1723 1722->1715 1723->1713 1729 8e8f8e9-8e8f8ec 1723->1729 1726 8e8f918-8e8f91b 1724->1726 1727 8e8f90a-8e8f911 1724->1727 1725->1724 1735 8e8f91d-8e8f92e 1726->1735 1736 8e8f933-8e8f936 1726->1736 1731 8e8f962-8e8f969 1727->1731 1732 8e8f913 1727->1732 1733 8e8f9ab-8e8f9b2 1728->1733 1734 8e8f9b7-8e8f9ba 1728->1734 1729->1719 1732->1726 1733->1734 1737 8e8f9bc-8e8f9c1 1734->1737 1738 8e8f9c4-8e8f9c7 1734->1738 1735->1736 1739 8e8f938-8e8f93c 1736->1739 1740 8e8f950-8e8f952 1736->1740 1737->1738 1742 8e8f9c9-8e8f9da 1738->1742 1743 8e8f9e1-8e8f9e4 1738->1743 1739->1713 1744 8e8f93e-8e8f946 1739->1744 1745 8e8f959-8e8f95c 1740->1745 1746 8e8f954 1740->1746 1742->1733 1755 8e8f9dc 1742->1755 1748 8e8fa10-8e8fba4 1743->1748 1749 8e8f9e6-8e8f9e9 1743->1749 1744->1713 1747 8e8f948-8e8f94b 1744->1747 1745->1698 1745->1731 1746->1745 1747->1740 1800 8e8fbaa-8e8fbb1 1748->1800 1801 8e8fcdd-8e8fcf0 1748->1801 1751 8e8f9eb-8e8f9fc 1749->1751 1752 8e8fa07-8e8fa0a 1749->1752 1760 8e8fa02 1751->1760 1761 8e8fd54-8e8fd67 1751->1761 1752->1748 1753 8e8fcf3-8e8fcf6 1752->1753 1753->1748 1756 8e8fcfc-8e8fcff 1753->1756 1755->1743 1758 8e8fd1d-8e8fd20 1756->1758 1759 8e8fd01-8e8fd12 1756->1759 1763 8e8fd3e-8e8fd41 1758->1763 1764 8e8fd22-8e8fd33 1758->1764 1759->1733 1770 8e8fd18 1759->1770 1760->1752 1767 8e8fd4f-8e8fd52 1763->1767 1768 8e8fd43-8e8fd4a 1763->1768 1764->1742 1775 8e8fd39 1764->1775 1767->1761 1772 8e8fd6a-8e8fd6d 1767->1772 1768->1767 1770->1758 1773 8e8fd8b-8e8fd8d 1772->1773 1774 8e8fd6f-8e8fd80 1772->1774 1777 8e8fd8f 1773->1777 1778 8e8fd94-8e8fd97 1773->1778 1774->1733 1782 8e8fd86 1774->1782 1775->1763 1777->1778 1778->1728 1780 8e8fd9d-8e8fda6 1778->1780 1782->1773 1802 8e8fc65-8e8fc6c 1800->1802 1803 8e8fbb7-8e8fbda 1800->1803 1802->1801 1805 8e8fc6e-8e8fca1 1802->1805 1812 8e8fbe2-8e8fbea 1803->1812 1816 8e8fca3 1805->1816 1817 8e8fca6-8e8fcd3 1805->1817 1814 8e8fbec 1812->1814 1815 8e8fbef-8e8fc30 1812->1815 1814->1815 1825 8e8fc48-8e8fc59 1815->1825 1826 8e8fc32-8e8fc43 1815->1826 1816->1817 1817->1780 1817->1801 1825->1780 1826->1780
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $
                                                  • API String ID: 0-3993045852
                                                  • Opcode ID: 69bc6bae5e55c1829480223db342a31df0d9f6cec8bb32c485967872cd494582
                                                  • Instruction ID: 5789b26bb2bba42a833cd7543398b8a8b4608bc7e4b464da444efd7c43b0eb78
                                                  • Opcode Fuzzy Hash: 69bc6bae5e55c1829480223db342a31df0d9f6cec8bb32c485967872cd494582
                                                  • Instruction Fuzzy Hash: 6822AE32E40205DFDF24EBA4C4806AEBBB2FF85315F24956AD85DAB354DA35DC42CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1829 62a8e58-62a8e71 1830 62a8e73-62a8e76 1829->1830 1831 62a8e78-62a8e94 1830->1831 1832 62a8e99-62a8e9c 1830->1832 1831->1832 1833 62a8e9e-62a8ea3 1832->1833 1834 62a8ea6-62a8ea9 1832->1834 1833->1834 1836 62a8eab 1834->1836 1837 62a8eb9-62a8ebc 1834->1837 1845 62a8eb1-62a8eb4 1836->1845 1838 62a8ed9-62a8edc 1837->1838 1839 62a8ebe-62a8ec7 1837->1839 1842 62a90e2-62a90eb 1838->1842 1843 62a8ee2-62a8ee4 1838->1843 1840 62a90fc 1839->1840 1841 62a8ecd-62a8ed4 1839->1841 1849 62a9101-62a9110 1840->1849 1841->1838 1842->1839 1846 62a90f1-62a90fb 1842->1846 1847 62a8eeb-62a8eee 1843->1847 1848 62a8ee6 1843->1848 1845->1837 1847->1830 1850 62a8ef0-62a8fa4 1847->1850 1848->1847 1849->1849 1851 62a9112-62a9133 1849->1851 1970 62a8faa-62a8fb5 1850->1970 1971 62a90a0-62a90c4 1850->1971 1852 62a9135-62a9138 1851->1852 1854 62a913e-62a9141 1852->1854 1855 62a9224-62a922d 1852->1855 1856 62a915b-62a915e 1854->1856 1857 62a9143-62a914c 1854->1857 1855->1857 1859 62a9233 1855->1859 1862 62a9168-62a916b 1856->1862 1863 62a9160-62a9165 1856->1863 1860 62a932b-62a9366 1857->1860 1861 62a9152-62a9156 1857->1861 1864 62a9238-62a923b 1859->1864 1881 62a9368-62a936b 1860->1881 1861->1856 1866 62a916d-62a9170 1862->1866 1867 62a9175-62a9178 1862->1867 1863->1862 1868 62a924a-62a924d 1864->1868 1869 62a923d-62a9243 1864->1869 1866->1867 1874 62a917a-62a917c 1867->1874 1875 62a917f-62a9182 1867->1875 1868->1869 1872 62a924f-62a9252 1868->1872 1870 62a92b4-62a92ba 1869->1870 1871 62a9245 1869->1871 1870->1860 1880 62a92bc-62a92c0 1870->1880 1871->1868 1878 62a927c-62a927f 1872->1878 1879 62a9254-62a9277 1872->1879 1874->1875 1876 62a918f-62a9192 1875->1876 1877 62a9184-62a918a 1875->1877 1883 62a91b6-62a91b9 1876->1883 1884 62a9194-62a91af 1876->1884 1877->1876 1888 62a929f-62a92a2 1878->1888 1889 62a9281-62a929a 1878->1889 1879->1878 1885 62a92c5-62a92c8 1880->1885 1886 62a9378-62a937b 1881->1886 1887 62a936d-62a9377 1881->1887 1895 62a91bb-62a91bc 1883->1895 1896 62a91c1-62a91c4 1883->1896 1884->1866 1929 62a91b1 1884->1929 1893 62a92ca-62a92dc 1885->1893 1894 62a92e1-62a92e4 1885->1894 1897 62a939e-62a93a1 1886->1897 1898 62a937d-62a9399 1886->1898 1890 62a92af-62a92b2 1888->1890 1891 62a92a4-62a92aa 1888->1891 1889->1888 1890->1870 1890->1885 1891->1890 1893->1894 1903 62a92e6-62a9302 1894->1903 1904 62a9307-62a9309 1894->1904 1895->1896 1905 62a91c6-62a91d0 1896->1905 1906 62a91d5-62a91d8 1896->1906 1900 62a93b8-62a93bb 1897->1900 1901 62a93a3-62a93b1 1897->1901 1898->1897 1911 62a93db-62a93dd 1900->1911 1912 62a93bd-62a93d6 1900->1912 1933 62a93ed-62a941a 1901->1933 1934 62a93b3 1901->1934 1903->1904 1908 62a930b 1904->1908 1909 62a9310-62a9313 1904->1909 1905->1906 1916 62a91da-62a91e8 1906->1916 1917 62a91ef-62a91f2 1906->1917 1908->1909 1909->1852 1918 62a9319-62a932a 1909->1918 1925 62a93df 1911->1925 1926 62a93e4-62a93e7 1911->1926 1912->1911 1916->1895 1937 62a91ea 1916->1937 1923 62a921f-62a9222 1917->1923 1924 62a91f4-62a921a 1917->1924 1923->1855 1923->1864 1924->1923 1925->1926 1926->1881 1926->1933 1929->1883 1949 62a95a9-62a95ae 1933->1949 1950 62a9420-62a9442 1933->1950 1934->1900 1937->1917 1955 62a95b3-62a95bd 1949->1955 1954 62a9448-62a9451 1950->1954 1950->1955 1954->1949 1957 62a9457-62a945f 1954->1957 1958 62a9595-62a95a1 1957->1958 1959 62a9465-62a947e 1957->1959 1958->1954 1961 62a95a7 1958->1961 1966 62a958b-62a9590 1959->1966 1967 62a9484-62a94ab 1959->1967 1961->1955 1966->1958 1967->1966 1977 62a94b1-62a94d9 1967->1977 1978 62a8fcd-62a909a call 62a0828 1970->1978 1979 62a8fb7-62a8fbd 1970->1979 1980 62a90ce-62a90cf 1971->1980 1981 62a90c6 1971->1981 1977->1966 1990 62a94df-62a94f9 1977->1990 1978->1970 1978->1971 1982 62a8fbf 1979->1982 1983 62a8fc1-62a8fc3 1979->1983 1980->1842 1981->1980 1982->1978 1983->1978 1990->1966 1994 62a94ff-62a951b 1990->1994 1994->1966 1999 62a951d-62a953c 1994->1999 1999->1966 2004 62a953e-62a9589 call 62a0828 1999->2004 2004->1958
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: ebae013b3fbddb6b49e6e97ed33d058be444511c048b08c3acb04979979edef4
                                                  • Instruction ID: 665f614f3f12cf265c73c9cefd25f9fee0d9174f5c84d4c4044a55016055fa56
                                                  • Opcode Fuzzy Hash: ebae013b3fbddb6b49e6e97ed33d058be444511c048b08c3acb04979979edef4
                                                  • Instruction Fuzzy Hash: 5922A030F202058FDB64DB69C494BADBBF2EF89310F248569D806DB391DA75DC86CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 08E82487
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: CheckDebuggerPresentRemote
                                                  • String ID:
                                                  • API String ID: 3662101638-0
                                                  • Opcode ID: 9e9334ae7cc4a6ce742e970194369526b84f4cdd2cd1481e05945c9e078711a3
                                                  • Instruction ID: 9f714c9d23c5f6a851ada565115a7daf12dd3d551702dc0019a01f197b16c985
                                                  • Opcode Fuzzy Hash: 9e9334ae7cc4a6ce742e970194369526b84f4cdd2cd1481e05945c9e078711a3
                                                  • Instruction Fuzzy Hash: 272128B2C00259CFDB10DF9AD445BEEBBF4AF49310F14841AE859A3350D778A944CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 41250ff6ae09bbfb5ffab42c06208c72941c8fac2654e0735453b7441bc46c7a
                                                  • Instruction ID: ebc7d4640da25928f4e835ce251f45f067dd7f90f3ff62e1bb92a8ddd045383f
                                                  • Opcode Fuzzy Hash: 41250ff6ae09bbfb5ffab42c06208c72941c8fac2654e0735453b7441bc46c7a
                                                  • Instruction Fuzzy Hash: E7A24635A00204CFDB64EB68C584B9DBBF2EB46319F6494A9D40DAB351DB35EC86CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7d5ff9e4b2fa82905c93d19fc6ec03b4026c038ee31f0e15e97d5ae613937f45
                                                  • Instruction ID: 011f0a7d3bff5e4ade19c5171ca5909d75c8d8c30044c3592919c7702d541ef1
                                                  • Opcode Fuzzy Hash: 7d5ff9e4b2fa82905c93d19fc6ec03b4026c038ee31f0e15e97d5ae613937f45
                                                  • Instruction Fuzzy Hash: 63628A34E103058FDB64DB68D594BADBBF2EB88318F148569D809EB391DB75EC46CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e29394eb3aa8178c25b642394137ea5f67c83573aba68a9f23d6f080d0dcfe4c
                                                  • Instruction ID: 7656f00499a793ee5516de4537b77ad74cbd2d2853592b18e83fa13972fa3427
                                                  • Opcode Fuzzy Hash: e29394eb3aa8178c25b642394137ea5f67c83573aba68a9f23d6f080d0dcfe4c
                                                  • Instruction Fuzzy Hash: 7B223E70E2030A8FEB64CB68D5907AEB7B2FB49310F248529E845EB395DB75DC81CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: DispatchMessage
                                                  • String ID:
                                                  • API String ID: 2061451462-0
                                                  • Opcode ID: 677ace99df9ee2b2bed7a87c1b4e72e29e074ed314dceb2001a477cbbe522f84
                                                  • Instruction ID: 983552e8581b3a86be46cdcacdddc57eb5f9d1ebcedde1b156728f331d8636cc
                                                  • Opcode Fuzzy Hash: 677ace99df9ee2b2bed7a87c1b4e72e29e074ed314dceb2001a477cbbe522f84
                                                  • Instruction Fuzzy Hash: F0F15934E2030A8FDB54DFA5C944B9DBBF2BF48304F148569E809AB665DBB0E945CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 83d5cec1bb64942577b592686a47d371e30bb37ed69703c2ed953077bc25a10a
                                                  • Instruction ID: c212a3b6576e51213362e088753225d02c44cd66756f2738b6936a28d1950a0c
                                                  • Opcode Fuzzy Hash: 83d5cec1bb64942577b592686a47d371e30bb37ed69703c2ed953077bc25a10a
                                                  • Instruction Fuzzy Hash: 39B15C71E00309CFDB24DFA9D8817ADBBF2AF48315F149529D81DEB294EB749846CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80f29f6b64efbac91e499b9a0d339273f5dfc0413c91796f38b27cd924b56b1c
                                                  • Instruction ID: a34fdca31eba6706891cdcbd8b4c59bdb3078860dd0c0c6af1d1a04a07530f42
                                                  • Opcode Fuzzy Hash: 80f29f6b64efbac91e499b9a0d339273f5dfc0413c91796f38b27cd924b56b1c
                                                  • Instruction Fuzzy Hash: 09918E71E00609CFDF24EFA9C98179DBBF2AF88315F149129D80DA7294DB749886CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2197 14eae48-14eae57 2198 14eae59-14eae66 call 14ea1c0 2197->2198 2199 14eae83-14eae87 2197->2199 2205 14eae7c 2198->2205 2206 14eae68 2198->2206 2201 14eae9b-14eaedc 2199->2201 2202 14eae89-14eae93 2199->2202 2208 14eaede-14eaee6 2201->2208 2209 14eaee9-14eaef7 2201->2209 2202->2201 2205->2199 2253 14eae6e call 14eb0d2 2206->2253 2254 14eae6e call 14eb0e0 2206->2254 2208->2209 2210 14eaf1b-14eaf1d 2209->2210 2211 14eaef9-14eaefe 2209->2211 2216 14eaf20-14eaf27 2210->2216 2213 14eaf09 2211->2213 2214 14eaf00-14eaf07 call 14ea1cc 2211->2214 2212 14eae74-14eae76 2212->2205 2215 14eafb8-14eb078 2212->2215 2218 14eaf0b-14eaf19 2213->2218 2214->2218 2248 14eb07a-14eb07d 2215->2248 2249 14eb080-14eb0ab GetModuleHandleW 2215->2249 2219 14eaf29-14eaf31 2216->2219 2220 14eaf34-14eaf3b 2216->2220 2218->2216 2219->2220 2223 14eaf3d-14eaf45 2220->2223 2224 14eaf48-14eaf51 call 14ea1dc 2220->2224 2223->2224 2228 14eaf5e-14eaf63 2224->2228 2229 14eaf53-14eaf5b 2224->2229 2230 14eaf65-14eaf6c 2228->2230 2231 14eaf81-14eaf8e 2228->2231 2229->2228 2230->2231 2233 14eaf6e-14eaf7e call 14ea1ec call 14ea1fc 2230->2233 2238 14eaf90-14eafae 2231->2238 2239 14eafb1-14eafb7 2231->2239 2233->2231 2238->2239 2248->2249 2250 14eb0ad-14eb0b3 2249->2250 2251 14eb0b4-14eb0c8 2249->2251 2250->2251 2253->2212 2254->2212
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 014EB09E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 72b779caf0c6a809a422d873085543ce4cab656802911ebe49143bb37d2ca2de
                                                  • Instruction ID: 316ffc317cf5218c84b002a7fd483dab6bd2646cff9c830d6cabc180073fa328
                                                  • Opcode Fuzzy Hash: 72b779caf0c6a809a422d873085543ce4cab656802911ebe49143bb37d2ca2de
                                                  • Instruction Fuzzy Hash: CF7137B0A00B058FD724DF2AD45975ABBF1FF88201F10892EE586D7B60DB35E845CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 03178b9440a28ea70327a08d8a23a70baf5e99d1baa13a29d4a68d9738540f50
                                                  • Instruction ID: 971f24182606d15c2f043ed9e3306477481158b80d25f35590d43f1bb5f8c6c5
                                                  • Opcode Fuzzy Hash: 03178b9440a28ea70327a08d8a23a70baf5e99d1baa13a29d4a68d9738540f50
                                                  • Instruction Fuzzy Hash: 0B415271D143868FCB10CF79D8446EEBBF1AF89310F0986AED844E7241DB789846CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 014E59E9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: eed91ef79d9aa379e4ca9f545967ec075a9d282aa5d4b0574838849ba7053fc5
                                                  • Instruction ID: ce18245a576bf4e8b90478b0db87973fc1d1ef68c26f66198e17460f7ba28c93
                                                  • Opcode Fuzzy Hash: eed91ef79d9aa379e4ca9f545967ec075a9d282aa5d4b0574838849ba7053fc5
                                                  • Instruction Fuzzy Hash: 0841F3B1C0071DCBEB24DFA9C884B8EBBF5BF48304F20806AD408AB250DB756946CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 014E59E9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: b40fd4d3dc8d18e87923766df5d94687e8caa1e2b6ddc86c5d339872976ed967
                                                  • Instruction ID: abd1d4d62e8e4021ecfb0f30ad94bb24235fc9290a143a2f92e47fe8a16460d0
                                                  • Opcode Fuzzy Hash: b40fd4d3dc8d18e87923766df5d94687e8caa1e2b6ddc86c5d339872976ed967
                                                  • Instruction Fuzzy Hash: 3C41D5B5C00719CFEB24DFA9C889B9EBBF1BF49304F24816AD408AB251DB756946CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EnumThreadWindows.USER32(?,00000000,?), ref: 08E83661
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: EnumThreadWindows
                                                  • String ID:
                                                  • API String ID: 2941952884-0
                                                  • Opcode ID: 214ff961942a28639c88ebb67d2983070e5ab0865bb05aa90249401a18dc4535
                                                  • Instruction ID: c4f0206227f0f362415d89fb5ad387b8512ddecbc4a5a0a53e1e8fc0167e720c
                                                  • Opcode Fuzzy Hash: 214ff961942a28639c88ebb67d2983070e5ab0865bb05aa90249401a18dc4535
                                                  • Instruction Fuzzy Hash: 7B3126B29002098FDB10DFAAC845BEEFBF5EB88324F14852AD469A7350D774A905CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 08E82487
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: CheckDebuggerPresentRemote
                                                  • String ID:
                                                  • API String ID: 3662101638-0
                                                  • Opcode ID: 3979f62ae9888b6212d986ea99b0aaaea418b018d59baa1b2a862dc09edcd224
                                                  • Instruction ID: fc3a89b88897af4c9b252004ce99a1696ded75daa651e5cd70aae9db6aac0983
                                                  • Opcode Fuzzy Hash: 3979f62ae9888b6212d986ea99b0aaaea418b018d59baa1b2a862dc09edcd224
                                                  • Instruction Fuzzy Hash: DE2148B2C00259CFDB10DFAAD485BEEBBF4AF48311F14846AE859A3351C7389945CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,014ED6EE,?,?,?,?,?), ref: 014ED7AF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 62b84659a9b293809d5430338c7f82363eef0aae0100caf6d59db4366afac8b1
                                                  • Instruction ID: 9900241b3f76d34d847a6191347774019341dcda084d9ba5af5d20b7c233a110
                                                  • Opcode Fuzzy Hash: 62b84659a9b293809d5430338c7f82363eef0aae0100caf6d59db4366afac8b1
                                                  • Instruction Fuzzy Hash: F521E4B5D003489FDB10CF9AD985ADEBBF9EB48310F14841AE914A7350D375A940CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,014ED6EE,?,?,?,?,?), ref: 014ED7AF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: a9191980c18f2b17957c521364011b1d8269bda81e6e238c8718c3d359e88e08
                                                  • Instruction ID: 92093d9bf0fd74fda1d0f8ad9dd580e28cadf052d68e67018f515b412ef86470
                                                  • Opcode Fuzzy Hash: a9191980c18f2b17957c521364011b1d8269bda81e6e238c8718c3d359e88e08
                                                  • Instruction Fuzzy Hash: BA21E3B5D002489FDB10CFAAD985ADEFFF9EB48310F14841AE954A7350D375A944CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EnumThreadWindows.USER32(?,00000000,?), ref: 08E83661
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: EnumThreadWindows
                                                  • String ID:
                                                  • API String ID: 2941952884-0
                                                  • Opcode ID: f57872ad3966c6785646be459a34b3ade2967eca1c6653936e38538896822482
                                                  • Instruction ID: e2e245f45d5560699327b1f2c9cb96da28b67b7f6e8fc74904ba34120bbb4c3b
                                                  • Opcode Fuzzy Hash: f57872ad3966c6785646be459a34b3ade2967eca1c6653936e38538896822482
                                                  • Instruction Fuzzy Hash: D721E5B1D002098FDB14DF9AC845BAEFBF5EB88320F14842AD469A3350D778A945CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,014EB119,00000800,00000000,00000000), ref: 014EB72A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: d44940424a9c9539891b957303e97c42235b4cbb85bbdca73e4e2bdb400505ed
                                                  • Instruction ID: 05fcf7087db581918b78c79c93491bf4d937e454ceff60bf1f743c30e1317ea7
                                                  • Opcode Fuzzy Hash: d44940424a9c9539891b957303e97c42235b4cbb85bbdca73e4e2bdb400505ed
                                                  • Instruction Fuzzy Hash: 751114B6D003098FDB20CFAAC448B9EFBF4EB48310F14842AE919A7710C375A945CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,014EB119,00000800,00000000,00000000), ref: 014EB72A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: a838a2fac894d0991d4c838999531f4a7cf14d5f4fa73c1c13c456f79e5aeb2d
                                                  • Instruction ID: 5cfe72c889627794cb55e8044690690fd601ca582071df6c57b63758c8e3b86d
                                                  • Opcode Fuzzy Hash: a838a2fac894d0991d4c838999531f4a7cf14d5f4fa73c1c13c456f79e5aeb2d
                                                  • Instruction Fuzzy Hash: 191112B6C003499FDB20CFAAD448ADEFFF8EB48310F14842AE959A7610C775A545CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32 ref: 062AAF67
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 3a099606ae3e78969a1ce28ad0f24bbad3af99ae98927c7d7509b53c9b48a9a7
                                                  • Instruction ID: 205faabf87dc8803c6acd8b3e32aa8e4133d70a1fed7c6bb49ebfdb55c2a7e00
                                                  • Opcode Fuzzy Hash: 3a099606ae3e78969a1ce28ad0f24bbad3af99ae98927c7d7509b53c9b48a9a7
                                                  • Instruction Fuzzy Hash: 3D1123B1C0025A9BCB20DF9AC445BDEFBF4EF48320F15812AD818A7240D779A941CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 014EB09E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: bccb6bb6459341ab74bb5558bd91b29796a0c1e88f3881f5a480dfac53e60b63
                                                  • Instruction ID: ca73f77770dd62b5687cd94e986199b37c924d280c8f44a32000aef161345657
                                                  • Opcode Fuzzy Hash: bccb6bb6459341ab74bb5558bd91b29796a0c1e88f3881f5a480dfac53e60b63
                                                  • Instruction Fuzzy Hash: FC11E3B6C003498FDB20DF9AC444BDEFBF4EB88324F14841AD969A7210D375A645CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,062AD807), ref: 062AE23D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: DispatchMessage
                                                  • String ID:
                                                  • API String ID: 2061451462-0
                                                  • Opcode ID: 8719ecb6c19334ad169cb273bebd9b92ba8c83aca837385b77e67da3b16604df
                                                  • Instruction ID: 5fcdde8c5f836246729806a52315c7eac413a09583eb612ce61bcf19da0d82b2
                                                  • Opcode Fuzzy Hash: 8719ecb6c19334ad169cb273bebd9b92ba8c83aca837385b77e67da3b16604df
                                                  • Instruction Fuzzy Hash: 3511F2B5C007499FCB20DF9AD945BCEFBF8EB48314F10842AE869A3610D379A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,062AD807), ref: 062AE23D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID: DispatchMessage
                                                  • String ID:
                                                  • API String ID: 2061451462-0
                                                  • Opcode ID: 92f5989b32c61f5d41ec0649962445633dec7739875003000433f66e8875e1b4
                                                  • Instruction ID: f0911081e5ae6b8088e60fbd29b7d41f752e1765dbd8fd35bf1dac50ec9ba6cf
                                                  • Opcode Fuzzy Hash: 92f5989b32c61f5d41ec0649962445633dec7739875003000433f66e8875e1b4
                                                  • Instruction Fuzzy Hash: 931122B1C107498FCB20DF9AD445BDEFBF4EB48310F10842AE858A3200D3B8A541CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq
                                                  • API String ID: 0-1098410595
                                                  • Opcode ID: b8b2d77247aaa0fb09f6992ede0e1bdb59648beb68f36dc94be5f49fcc491853
                                                  • Instruction ID: fd67a32f09400eb222c791ff8522a4fb54e4c5a9964d7da3e8a225d261ffd503
                                                  • Opcode Fuzzy Hash: b8b2d77247aaa0fb09f6992ede0e1bdb59648beb68f36dc94be5f49fcc491853
                                                  • Instruction Fuzzy Hash: 9131E774E043089BDB18DFAAC9447EEBBF6BF89300F15942AD519AB354DB709846CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq
                                                  • API String ID: 0-1098410595
                                                  • Opcode ID: 83a257a24aead13385ae51c3b9ea239d1dc079629a61de54ffe19ae82e8e268c
                                                  • Instruction ID: 6a718fceec1b7e2b88aa0cc4504ae267a5be7e193836f2f383622ffe52c64714
                                                  • Opcode Fuzzy Hash: 83a257a24aead13385ae51c3b9ea239d1dc079629a61de54ffe19ae82e8e268c
                                                  • Instruction Fuzzy Hash: EA21F6B0D043488BDB18DFAAC8446EEFBF6BF88300F05C42AD519AB254EB745846CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Teq
                                                  • API String ID: 0-1098410595
                                                  • Opcode ID: c93be05f2a11fb35c3054dfb9044ef7dfa54503bebb94726b793413bdb3af916
                                                  • Instruction ID: 2043306460703bbe655fb65a0843039085da33cef2d77c7db5643b67bd4d6e20
                                                  • Opcode Fuzzy Hash: c93be05f2a11fb35c3054dfb9044ef7dfa54503bebb94726b793413bdb3af916
                                                  • Instruction Fuzzy Hash: 45119075E00209CFCB08DFE8D9819ADFBB1FB48311F10812AE918AB265C7326946CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @
                                                  • API String ID: 0-2766056989
                                                  • Opcode ID: d7f3a9f2c49b5cbc16574ad464ac9d1ea389a9d66d1f65e29ac8bf2fcfd80755
                                                  • Instruction ID: 5d195a6b352fbd0e9a61cf4cccae32289f5ca07ae81414af5e2ec427154e5b06
                                                  • Opcode Fuzzy Hash: d7f3a9f2c49b5cbc16574ad464ac9d1ea389a9d66d1f65e29ac8bf2fcfd80755
                                                  • Instruction Fuzzy Hash: EBE0867090C204DFD705CB21C8565E9BFBDEB9B301B10E459E95A96101DB7445068B40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 685eb6be0bccf4c03ac4693ba9d77b04cda402f5bb33ccfb0a9fda227e7e46b3
                                                  • Instruction ID: fd01dcf65d1445077d5dfe0bfb60b664e1034be92abb7866068030ddcc182022
                                                  • Opcode Fuzzy Hash: 685eb6be0bccf4c03ac4693ba9d77b04cda402f5bb33ccfb0a9fda227e7e46b3
                                                  • Instruction Fuzzy Hash: 3CB16F74E0521ACFDB14DFA4C880AEDBBBAFF89300F119A16D549AB345DB30A946CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8fb982122327f04990c91443b37b0c5117306e20429c94fe910c655e2ca4c16d
                                                  • Instruction ID: 1239d89f8b364aaf5150d9cbc43337ca2e62add625339a5315f0068eb5bb96dc
                                                  • Opcode Fuzzy Hash: 8fb982122327f04990c91443b37b0c5117306e20429c94fe910c655e2ca4c16d
                                                  • Instruction Fuzzy Hash: 6CA13E74E15219CFDB14DFA4C880AEDFBBAFF89300F119A16E549AB345DB30A946CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1f0eddcbd88964a75b9185d64c50f95b781a49047bd840c0b4c5002bd2f8511a
                                                  • Instruction ID: 94fe3398e75c31f29dd8bf04c41ccad66a7dfcfc1b2f8c4040910dede0296a45
                                                  • Opcode Fuzzy Hash: 1f0eddcbd88964a75b9185d64c50f95b781a49047bd840c0b4c5002bd2f8511a
                                                  • Instruction Fuzzy Hash: 69613E39819308CFCB14CFA0D9547ECBBB9FB0A306F15616AD54EA7252DB349989CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 54808efaed71ac83cd88e16c4e332eae71bc172c5df1a15359239792a26e1516
                                                  • Instruction ID: 1360e12266cc273f65ece4fec3145793143282f2c7ab662d6385cb1f30752212
                                                  • Opcode Fuzzy Hash: 54808efaed71ac83cd88e16c4e332eae71bc172c5df1a15359239792a26e1516
                                                  • Instruction Fuzzy Hash: 6E61E775E04218CFDB51DFA8D894BDDBBB2FB49304F14809AD909AB342D731AA46CF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de5373a2b95424b9b5682693513dd896c68298ca86d3c691d653c5346929aa5c
                                                  • Instruction ID: 2bd28f3e65b6047f62ecd34253f75a48e339dcff82ffe0f8bf799983aa349d23
                                                  • Opcode Fuzzy Hash: de5373a2b95424b9b5682693513dd896c68298ca86d3c691d653c5346929aa5c
                                                  • Instruction Fuzzy Hash: F351D374E04219EFDB04CFA8D9849ADBBF2BF49310F15852AE916EB351D731A942CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 139da2bdd0e2b257c5c27a3b0d326cbad6f0085f90db02ecce0d86a4981489e1
                                                  • Instruction ID: 63eeb66b5ccfe7df3013d4897e020d8d9397a1c20535ce83c28e82643f01d999
                                                  • Opcode Fuzzy Hash: 139da2bdd0e2b257c5c27a3b0d326cbad6f0085f90db02ecce0d86a4981489e1
                                                  • Instruction Fuzzy Hash: F451F378E04249DFDB00CFA8D9849ADBBF2BF49310F15842AE95AEB351E7309942CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 24c265d24791c23b44cabcf88187fd0b49f8e6e4a2c9e6dc9b0c7955603b338a
                                                  • Instruction ID: 6599ac0a186f4dc40f1875157c5674e9a4af7c4180355f4796e153287da32388
                                                  • Opcode Fuzzy Hash: 24c265d24791c23b44cabcf88187fd0b49f8e6e4a2c9e6dc9b0c7955603b338a
                                                  • Instruction Fuzzy Hash: 5C517034D19209DFDB04CF98E8819ADFBBAFF49301B16D256E6469B345DB30E842CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 914dbbaf59d7508f5ed88793d3808b59252ea46a0a5278ee2d63627ba7cfa13a
                                                  • Instruction ID: e751f840cbca37144209f530f3958f6eb28513e9e087710320f0a4697cbeb27b
                                                  • Opcode Fuzzy Hash: 914dbbaf59d7508f5ed88793d3808b59252ea46a0a5278ee2d63627ba7cfa13a
                                                  • Instruction Fuzzy Hash: 80416F75D19208DFDB04EFA5E8456EDBBB7FF8A301F05A026D50AA7260EB308946CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cbfa50e22399f773df36fe9b2e86fcb92ca55a49000993ee3c6a65c00b1d90f6
                                                  • Instruction ID: 2c4604f6f4efdaefb8e948f42a0ab8b15b576750dd3516f6b73b9f083f246132
                                                  • Opcode Fuzzy Hash: cbfa50e22399f773df36fe9b2e86fcb92ca55a49000993ee3c6a65c00b1d90f6
                                                  • Instruction Fuzzy Hash: E5416D74E14208DFEB04CFA5D895BADBBBAFB49301F149027E90AAB394DF705901CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a595a9b04217a2af5b8fad4aadcd47539cee6dd1d4981ffa67f16789b14481ca
                                                  • Instruction ID: 4106fdd18b5f82f92854c624d84ba42aa2b4b01a6c3657c5e7165ee2602b1340
                                                  • Opcode Fuzzy Hash: a595a9b04217a2af5b8fad4aadcd47539cee6dd1d4981ffa67f16789b14481ca
                                                  • Instruction Fuzzy Hash: BB319274D5E108DBEB04CFA4E8446FDBBBAEB0A301F16B117E55AA3252DB349941CB14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8f2df8ec2343261158c010a37bcf35e0086fd799c9c1896d55e6fd70a05cdb84
                                                  • Instruction ID: a81a0aea2f703bd0a4eee24499bdb53ae68e17e75f30341197df5c44983048a7
                                                  • Opcode Fuzzy Hash: 8f2df8ec2343261158c010a37bcf35e0086fd799c9c1896d55e6fd70a05cdb84
                                                  • Instruction Fuzzy Hash: 5F41F2B0D003499FDB24DFA9C880ADEBFB5FF48314F14842AE819AB260DB759946CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 75a738ab85cfb6e0b4efdccd9e88511929a72016f2227ded878755d9a2d501f3
                                                  • Instruction ID: ce82f36916db512a0cc68aecbc0e493e1aba487d9d7f8817aab9072a1310bb55
                                                  • Opcode Fuzzy Hash: 75a738ab85cfb6e0b4efdccd9e88511929a72016f2227ded878755d9a2d501f3
                                                  • Instruction Fuzzy Hash: 63310A74D15208DFDB04EFA6D8446EDBBBBFF89300F15A02AD51AA7250DB305946CF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e1e8a0d5642a733f79de1e78d9a48b4d0fb9643c652569f8e319cf3ac57e43c3
                                                  • Instruction ID: 423599ffd5c89481d3a7cad6ada405d64919c2746d41485fbb70e9356318cfa7
                                                  • Opcode Fuzzy Hash: e1e8a0d5642a733f79de1e78d9a48b4d0fb9643c652569f8e319cf3ac57e43c3
                                                  • Instruction Fuzzy Hash: 9741E1B0D003499FDB14DFA9C884A9EBBB5FF48310F54842AE919AB260DB75A945CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 09f7be518144bf7e4798779ff15d906cdcd479ebb47722a513aa4d0a58c55d50
                                                  • Instruction ID: 96439c3cb462258978d02c02afe5e8e08aea832e65a68d27d74308814eae683b
                                                  • Opcode Fuzzy Hash: 09f7be518144bf7e4798779ff15d906cdcd479ebb47722a513aa4d0a58c55d50
                                                  • Instruction Fuzzy Hash: CE21F430A412428BFF751725E44E77D3B2AFB06311F150D27E90ACF3A0DA69D992C752
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5b0b74dd6076475b02ae44c916d2b3c65a25056b43a04f3451108a81d533b050
                                                  • Instruction ID: a7fa3144f525c0e2df5ea1d40fa8641f9978ba0c91472f82e21b84eac95d3f6c
                                                  • Opcode Fuzzy Hash: 5b0b74dd6076475b02ae44c916d2b3c65a25056b43a04f3451108a81d533b050
                                                  • Instruction Fuzzy Hash: 1221DE75D49208DFDB04CFA6E9406FCBFFAAB8A201F11A067D509A3251DF304A05CB24
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ead6da2343212356b992836ec2389a78bcbc626a53c71e90b8dd789a4d2c730
                                                  • Instruction ID: 2a8b2f492d64a6ec99679b43dbc0b11f1d3c894cf155ab851f923c2f87ff3142
                                                  • Opcode Fuzzy Hash: 4ead6da2343212356b992836ec2389a78bcbc626a53c71e90b8dd789a4d2c730
                                                  • Instruction Fuzzy Hash: 65218375D58108DBEB04CFA5D9056FDBBFAEB8E211F15B017E546B3244DF3089018B55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1bf22bbd02d277f36085b562c9e7bc06605398011dea91469a40329a3cffcec7
                                                  • Instruction ID: 74459c1eeb55f14580198d319ae786c0c8b20bb2805e8397d2c62c90b7e0f0fa
                                                  • Opcode Fuzzy Hash: 1bf22bbd02d277f36085b562c9e7bc06605398011dea91469a40329a3cffcec7
                                                  • Instruction Fuzzy Hash: F9316B78D0421ACFDB10DFA8D880BADBBF6FB45305F01A5A6E509AB355DB30A946CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 071ede713ee1cebb98ffc773270daa850d42f36c32e5197a7f4f50d8dc81fb9d
                                                  • Instruction ID: 8403edeca984bd6a3c5a055a825c657054812fd1dae35e5deeeb9c97fad4004d
                                                  • Opcode Fuzzy Hash: 071ede713ee1cebb98ffc773270daa850d42f36c32e5197a7f4f50d8dc81fb9d
                                                  • Instruction Fuzzy Hash: A73104B0D01248DFDB14CFA9D595BDDBBF5AF48314F24801AE409A7360DB759946CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bc043a0b4c5fdfbc61caa40e2f70797053182f37ffb63d8a5ba19a0d9fa913ed
                                                  • Instruction ID: 9ce49e226399bac1951a8d9789a568bb548132e88a9ba9e49bc349aeab563efb
                                                  • Opcode Fuzzy Hash: bc043a0b4c5fdfbc61caa40e2f70797053182f37ffb63d8a5ba19a0d9fa913ed
                                                  • Instruction Fuzzy Hash: 0A312774E142099FCB04CFA9D995AEDBBF5FF49310F11902AE915AB350DB349941CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3661936611.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10dd000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e70b13847afeecb2ed829bf2091d46fe6fb80d53353214206449c84725e26348
                                                  • Instruction ID: b8a6b8a0507768d758e7b5879ddfb95647258bcb4aa543c7e22de073325d9009
                                                  • Opcode Fuzzy Hash: e70b13847afeecb2ed829bf2091d46fe6fb80d53353214206449c84725e26348
                                                  • Instruction Fuzzy Hash: A8212871504340DFDB15DF54D9C0B2ABFA5FB84318F60C5A9D8850F29AC336D456CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3661936611.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10dd000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1b968ba9ddb8e10a7e51dcf36cbad49a5283b7e447c721d692f7e3361a55979d
                                                  • Instruction ID: 24218d601407ebd84a5390f6d6db9e049cd2353166fa3e242234328035e6d86b
                                                  • Opcode Fuzzy Hash: 1b968ba9ddb8e10a7e51dcf36cbad49a5283b7e447c721d692f7e3361a55979d
                                                  • Instruction Fuzzy Hash: 8821F171604304DFDB15DF94D9C0B6ABBA5FB88324F20C1A9E9490B296C736E456CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9ade439377be6f705056121c184a140db7d117490144ffa986124b799553ba90
                                                  • Instruction ID: b071e4f0bd4f9bb3ac4dc98295f332c0f2a5351b552c58f7807f5a78cb7be563
                                                  • Opcode Fuzzy Hash: 9ade439377be6f705056121c184a140db7d117490144ffa986124b799553ba90
                                                  • Instruction Fuzzy Hash: E431C974E042198FDB60DFA8D894BADB7B2FB49314F1481AAD949EB342E7309985CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 36399bb7159c070f5493c2d135ffc0ba0e0deed13e7f38e254d6b41bdc485689
                                                  • Instruction ID: 1f3c3be9254cad9841e077ddbbe374e2c11cb0bcdbfbbf9b98247902a83f7f1e
                                                  • Opcode Fuzzy Hash: 36399bb7159c070f5493c2d135ffc0ba0e0deed13e7f38e254d6b41bdc485689
                                                  • Instruction Fuzzy Hash: 2A21217490D288DFDB09CFA4D946BA9BF74AF0A301F0602CBD1488B362C734A909CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b410f1adbda680febe36b301f0844a4527a2b44b9623f222b440c4fad95a9253
                                                  • Instruction ID: 95e91d03c5ed46a0d70b421e7394ca347dbbc0f8a52eada650de9098865e8bbd
                                                  • Opcode Fuzzy Hash: b410f1adbda680febe36b301f0844a4527a2b44b9623f222b440c4fad95a9253
                                                  • Instruction Fuzzy Hash: BB31B474E10308DBDF14DFA4D8946ADBBB6FF8A201F609029D51A6B395CB305C42DF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6448e2d43ded3c918b4866a94142751b9ca39fe0f64ccd90a40b230bcbefb841
                                                  • Instruction ID: 4bd36c011399b01ff879aa513b3d8f70a84d90850b4bc598b7aaf2571ab8bd70
                                                  • Opcode Fuzzy Hash: 6448e2d43ded3c918b4866a94142751b9ca39fe0f64ccd90a40b230bcbefb841
                                                  • Instruction Fuzzy Hash: 1321F8319003408FDB61E738E888B6D3BAAFF4131AF114562E105CB269DA75DC5ACB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e8460aaa614cdb6d9121efb4a28df3251a8cbe32f7e7ad4f6569037872900621
                                                  • Instruction ID: ca77d5fd8d31a348023c7e4953f43e13395c92e585f3d6d84454ac81ff72935c
                                                  • Opcode Fuzzy Hash: e8460aaa614cdb6d9121efb4a28df3251a8cbe32f7e7ad4f6569037872900621
                                                  • Instruction Fuzzy Hash: B031E0B0D01248DFDB24DFA9C594B9DBBF5EF48314F20802AE909AB364DB75A945CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3663176490.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10ed000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e90d1c138ffa86a717af3071bd2d63730a7daed9a80cf4ddbc9cb29fc7666b8e
                                                  • Instruction ID: 3b1bba1f5f51cb17e5c11e2bf2e08cefaf2473dfe4fd12873f746e0d9820b6f4
                                                  • Opcode Fuzzy Hash: e90d1c138ffa86a717af3071bd2d63730a7daed9a80cf4ddbc9cb29fc7666b8e
                                                  • Instruction Fuzzy Hash: 31210071604300DFDB15DF54D988B16BFE1EB84314F28C5ADE88A0B286C336D807CB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3663176490.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10ed000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f7f9603e0538a161168814b66a5689d0d92225023076504fb2dcb0eccd270495
                                                  • Instruction ID: b4c8f050fb22cb3d8b3f4522f5feea8b1e5dd02f29e35bafc15b7172971891cc
                                                  • Opcode Fuzzy Hash: f7f9603e0538a161168814b66a5689d0d92225023076504fb2dcb0eccd270495
                                                  • Instruction Fuzzy Hash: 5921F575A04200EFDB15DF95D9C8B15BBE5FB94324F20C5ADD8894F292C336D446CB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 77d1c4bfe3552ce5104acaa6e8dc9ccb135213c2eaff44481238f831bad62d4d
                                                  • Instruction ID: 2bfe103585fc8c854268a89242b098442cf74eefad1aadeb9d481d61ba11ea2d
                                                  • Opcode Fuzzy Hash: 77d1c4bfe3552ce5104acaa6e8dc9ccb135213c2eaff44481238f831bad62d4d
                                                  • Instruction Fuzzy Hash: 33214C71B042048FDB64EF78D9587AD7BF6FB49205F1104AAD602EB3A1EB359D41CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6d8fcff69d05202eae248cce2a26f3e472e5485140597b55d4b25e6b7afad98b
                                                  • Instruction ID: 35d415981c4cd1804f839f534290a09f1cee9d53f103c7f80dbcffd6068a3a1c
                                                  • Opcode Fuzzy Hash: 6d8fcff69d05202eae248cce2a26f3e472e5485140597b55d4b25e6b7afad98b
                                                  • Instruction Fuzzy Hash: D531E574E142099FCB04DFA9D894AEDBBF5FF49310F11902AE915AB350DB34A941CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c4e253b924a9173f6cdb40ff6411622f7a62f4dbd4c29f19a909b0834143f3ec
                                                  • Instruction ID: 29c4c7207ee48b24d4f669e782390b8298f3b643f00d30a9d2bc83ae5c3ac57f
                                                  • Opcode Fuzzy Hash: c4e253b924a9173f6cdb40ff6411622f7a62f4dbd4c29f19a909b0834143f3ec
                                                  • Instruction Fuzzy Hash: F631B574E15308DFEB00DFA4E899BADBBBAFB49301F105016E90AAB794CB706941CF11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5a1e05c12f4762de920b93e35144d879eefcb7df06b3329ff061585d6d76258c
                                                  • Instruction ID: 701a9a286f9cf8fee23bfc75a0aa277ac10073d64ad4c4b1a03aad0053bdc268
                                                  • Opcode Fuzzy Hash: 5a1e05c12f4762de920b93e35144d879eefcb7df06b3329ff061585d6d76258c
                                                  • Instruction Fuzzy Hash: 0C21BE74D09289CBEB10CFAAC8443EDBFF6AF4B310F1491ABC568A7291EB344542CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f775baaddaaa7544834c05dd5067a250d657c3d9b5195802b26bfac3ff32ce99
                                                  • Instruction ID: 043e0a7ebfba9fb9314ade27500610b1b3e5c827611da6c44545c91cdb9a84ec
                                                  • Opcode Fuzzy Hash: f775baaddaaa7544834c05dd5067a250d657c3d9b5195802b26bfac3ff32ce99
                                                  • Instruction Fuzzy Hash: E9212A70B042148FDB64EB68C9587AE7BFAFB89205F110469D506EB3A1EF359D40CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 070345ad5c15b6f6b35f257fe6faa5174bbdfd4f671e18c42d51e0e2254fdd6d
                                                  • Instruction ID: 541c5c699378d8ffe6e4766a5954b79d8b24b5a2bbc66853efd48034a2478175
                                                  • Opcode Fuzzy Hash: 070345ad5c15b6f6b35f257fe6faa5174bbdfd4f671e18c42d51e0e2254fdd6d
                                                  • Instruction Fuzzy Hash: 5711B074D1E108CBEB00CFA5E8441FDBBBAEB4E301F12B117D54AA2245DB349545CB14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5c5f339c40ab0daaeb36b814e53e510cfe2480c8afdb71d31216fc15ceb6f140
                                                  • Instruction ID: 1a13511b69890c62b1adbe8cd097419500fab8722a4cdd439ad482e906f0016c
                                                  • Opcode Fuzzy Hash: 5c5f339c40ab0daaeb36b814e53e510cfe2480c8afdb71d31216fc15ceb6f140
                                                  • Instruction Fuzzy Hash: 99216DB4D19608CBEB04CFA6C8053EEBBFAAF8A300F05E027C519A6255EB3485018B50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 61195109bf40f1ec848a674d3eb5b8b39c73e89d6b10f91d68d367882c3377db
                                                  • Instruction ID: 82dfdf02884ee0285730069a8349720ed90d069b9c5cc5dfe3118e093ac0b539
                                                  • Opcode Fuzzy Hash: 61195109bf40f1ec848a674d3eb5b8b39c73e89d6b10f91d68d367882c3377db
                                                  • Instruction Fuzzy Hash: 0431B434A15219CFDB24CF54C984FA9BBB6FB49301F5151AAD90AA7351DB30AD81CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 63c8d1ed689dc5cd69121c5a067411528aac7d3602702cce0c25e8ff450cc20e
                                                  • Instruction ID: 741184df067b5d9584158db9224a03cfe3d4072b0f46972b11786bd133dbea04
                                                  • Opcode Fuzzy Hash: 63c8d1ed689dc5cd69121c5a067411528aac7d3602702cce0c25e8ff450cc20e
                                                  • Instruction Fuzzy Hash: 61112975E59208DBDB04CFA5E9445EDBBFAEB8E211F05B027E54AB3240DF3059058B25
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 81ea0ff8defa22eebfb9b47387a507d05f1447ca13c3d32c765a1348ebbab2ca
                                                  • Instruction ID: 8c3b3e6e699d78544213941c723b47fe4427214213d4f25349a46c19201bf517
                                                  • Opcode Fuzzy Hash: 81ea0ff8defa22eebfb9b47387a507d05f1447ca13c3d32c765a1348ebbab2ca
                                                  • Instruction Fuzzy Hash: 5A21BB35A003508FDF60E728F988B6D3BAAFB4571AF114521E105CB368DA75EC55C792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e03801329e664d2c07b7b56420d669800d60cb1a3f0dc5216ed36981f305a3fe
                                                  • Instruction ID: 1b279695e1fc0b26462616549a80f9dbe14ef98fabd80c5a8d8653753e05adb4
                                                  • Opcode Fuzzy Hash: e03801329e664d2c07b7b56420d669800d60cb1a3f0dc5216ed36981f305a3fe
                                                  • Instruction Fuzzy Hash: CE11A039A29218DBCB14DEA5E8056FDBB7EFB4B301F016427D64EA3200DA3095058794
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 856981aff9a0b0a509c32c3c073ad36ec09886c42dc58bbd98bf958fd834a09e
                                                  • Instruction ID: a9ddaa74a5c8c7357d200fa6821e7a5e35a28b9e053ca6d74291b42ec91a61f3
                                                  • Opcode Fuzzy Hash: 856981aff9a0b0a509c32c3c073ad36ec09886c42dc58bbd98bf958fd834a09e
                                                  • Instruction Fuzzy Hash: 851101316082028BDF216BB49451BB93BA3FB82318F16497BC547CF285DE22CC468BD1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6e58beab661c1be7afffe90d675c37195e1a17f85c2582a5bcfce54c7ee57627
                                                  • Instruction ID: ac7d444d9e54087fa9d3ce7ec8ffe0412c01b766403f0b2df99570e2d8117532
                                                  • Opcode Fuzzy Hash: 6e58beab661c1be7afffe90d675c37195e1a17f85c2582a5bcfce54c7ee57627
                                                  • Instruction Fuzzy Hash: 0011D636F002099FDB04DFA5D845AAEBBBAEFC5310B44856BE514EB250DB30A915CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 884b0377a4b1c375979818b7f7f0ee4a55e1b8f79a1ad26e395156cfe2f57c03
                                                  • Instruction ID: f99908fe9008bf6cf5aca873d9a9c581ff589ccf518796e23270dd956999c579
                                                  • Opcode Fuzzy Hash: 884b0377a4b1c375979818b7f7f0ee4a55e1b8f79a1ad26e395156cfe2f57c03
                                                  • Instruction Fuzzy Hash: 37213A34E0421ACFDB10DFA8D840BADBBB6FB45305F1195A6E509AB354DB70AD46CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f892b1f6d3ab8733865a5e06e42332073d3aa53fa01281e9e86be139b5e9e689
                                                  • Instruction ID: 371787f7d3b64950d607389aaf65809ce78407ef06a8ba3c7f32274cb71257a4
                                                  • Opcode Fuzzy Hash: f892b1f6d3ab8733865a5e06e42332073d3aa53fa01281e9e86be139b5e9e689
                                                  • Instruction Fuzzy Hash: 8211CE31A012529FCB61EFB888552EE7BFAEF8A210B15047BC505E7211E631C8428BA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f07e88f7b6270577b67961e32e4d40222867cb07cb29c1bbe56f9313999814ad
                                                  • Instruction ID: 5a7d032d38307116d5a291a0649428e2b78b1dc2c47ddf863aa058e2aeb06831
                                                  • Opcode Fuzzy Hash: f07e88f7b6270577b67961e32e4d40222867cb07cb29c1bbe56f9313999814ad
                                                  • Instruction Fuzzy Hash: D7213938A14219CFDB20DFA8E944B9DBBB9FB09315F1195A6E509AB384DB30AD41CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3663176490.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10ed000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 561e316a5ed77f6118ff7c5287531a15f3d0b79e0580107bfa2f1c7a8ae6a8d1
                                                  • Instruction ID: 3fca60750a1f7d4ac2867bebf51ad3ae3d03f390c7e0ca58d2f02e8ffe7832f8
                                                  • Opcode Fuzzy Hash: 561e316a5ed77f6118ff7c5287531a15f3d0b79e0580107bfa2f1c7a8ae6a8d1
                                                  • Instruction Fuzzy Hash: 212192755093808FCB13CF64D994715BFB1EB46214F28C5DAD8898F2A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1362c117507679d3badfa113211fbb18fa7fb306606c75fd3e7954ab47e15ef5
                                                  • Instruction ID: e9c9247ecbc61713acff81d0ed8e8823b6f700296c644a5ba6ac1d7a90f925bc
                                                  • Opcode Fuzzy Hash: 1362c117507679d3badfa113211fbb18fa7fb306606c75fd3e7954ab47e15ef5
                                                  • Instruction Fuzzy Hash: 331191317042068BDF64BAA9C444B793697FB81318F12453BD607CF354DE22DD4687D1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 898898cf6f397c999f22f1c4511b943d116ce391ec773a72dad6a37f7c49b432
                                                  • Instruction ID: bc1310330299406c69a24cfedc50132ccb291ae305ef4233e7d13962148e9c92
                                                  • Opcode Fuzzy Hash: 898898cf6f397c999f22f1c4511b943d116ce391ec773a72dad6a37f7c49b432
                                                  • Instruction Fuzzy Hash: D2114C34B002068BDB289B799C14BFA76A7FB84760F16812BAA4697380EA309D4187D1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5106abfbf30512fffc30c2e3fbfbaf353c23ccdd6226e8791cad55172d76323
                                                  • Instruction ID: a45f1733fe8eabf75574b263448290fc28a314a0bebde2d24b62b5867620ef07
                                                  • Opcode Fuzzy Hash: a5106abfbf30512fffc30c2e3fbfbaf353c23ccdd6226e8791cad55172d76323
                                                  • Instruction Fuzzy Hash: 46213870D1920DDFCB04DFA4D4555AEBFB6EF4A201F20606AD50AA3341DB305A02CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8251844d8050f3975aae547a85dfa882cc59a40af058398d4a6644868cfe12ff
                                                  • Instruction ID: 74bbacf66bab218463988b7e1a25580642b2a67c787b674e2be5637f2490cfc3
                                                  • Opcode Fuzzy Hash: 8251844d8050f3975aae547a85dfa882cc59a40af058398d4a6644868cfe12ff
                                                  • Instruction Fuzzy Hash: 642115B1D056588BEB18CFABC94579EBFB7BFC9304F18C06AD408AB264DB7409458F90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1830b2216e78eec96c13789092545250d9f51dd193b424b1c20d1117cadbf330
                                                  • Instruction ID: 3ad17ea7892b92927bca3969615468dd9807d61f6bf1b778a177a87b155039e3
                                                  • Opcode Fuzzy Hash: 1830b2216e78eec96c13789092545250d9f51dd193b424b1c20d1117cadbf330
                                                  • Instruction Fuzzy Hash: D8112B75D1D21CDBCB04DFA4D4182FEBBBAEB4A201F01602AD616A32A1DB744E14CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7cd47d84079cfb7bce6b741f1f9f2bbb89ab69447ef6e07428039d71f74b84ce
                                                  • Instruction ID: 78faee9ba3b6df81778302e4e465ded25a2b67c888318a4febbca8246fba1caa
                                                  • Opcode Fuzzy Hash: 7cd47d84079cfb7bce6b741f1f9f2bbb89ab69447ef6e07428039d71f74b84ce
                                                  • Instruction Fuzzy Hash: 2B1159B6F002509FCB01AFB898097AE3FFAEB88250F14457ADA09C3355EB30C901C790
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e0ced214d116856368663e8f71d8c0fa6f1ef978cf06840b19cab1e20ed8c707
                                                  • Instruction ID: 3a4aa4ab4de9ff492d45f69ccd174d99a2c9203a0f924a5241dec82805b0fe42
                                                  • Opcode Fuzzy Hash: e0ced214d116856368663e8f71d8c0fa6f1ef978cf06840b19cab1e20ed8c707
                                                  • Instruction Fuzzy Hash: 55219A70E19248DFDB08CF6AE9416ADBBF6BF89301F04D1AAE5059B350DB349901CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a832b34189d8a33cbbd11116f9a75bd58ea8c6c7daa6ff45faba42b996d6a173
                                                  • Instruction ID: 520e6c2a00eb5747a117c996e6b277be78a45d0eee5a6f2fcff166e82bc2f843
                                                  • Opcode Fuzzy Hash: a832b34189d8a33cbbd11116f9a75bd58ea8c6c7daa6ff45faba42b996d6a173
                                                  • Instruction Fuzzy Hash: 2521B634E553089FEB04CFA0E899BADBBBAFB4A701F205016E909AB794CB705941CB05
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 652e3ac9ae1da6254f4a590da16f995c70a73ebc2b60e41ed38c74d369bcc7e5
                                                  • Instruction ID: ab7a3bda8c6b0b00c0c5797d955fea22379aeeb6b4c2edc9670235f02e96b77f
                                                  • Opcode Fuzzy Hash: 652e3ac9ae1da6254f4a590da16f995c70a73ebc2b60e41ed38c74d369bcc7e5
                                                  • Instruction Fuzzy Hash: 19219F74E2521CCFCB14DFA4D9885ADBBBAFF4A300B51902AE90AA7354DB305D41DB10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ccea4fdf7441a2a3436d0b18dd64b5ad1b8a46e0083df627a8071b07c5ba80f8
                                                  • Instruction ID: 0b8c8a65f1b8f8ce3cb64b4014f94a92718596970295b545640b3b1ae835f665
                                                  • Opcode Fuzzy Hash: ccea4fdf7441a2a3436d0b18dd64b5ad1b8a46e0083df627a8071b07c5ba80f8
                                                  • Instruction Fuzzy Hash: EC219D34D04219CFCB20DFA8E844B9DBBB5FB45305F0195A6E509AB394CB30AD81CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35d756a5c6acee2c4ee1d02ee87ef929dd55ac866cc7ab4e9c266ea50cc710b9
                                                  • Instruction ID: 382cf792d530d4d746554f640b9afbccab9252b9c065cf4ce997a7fe239ee236
                                                  • Opcode Fuzzy Hash: 35d756a5c6acee2c4ee1d02ee87ef929dd55ac866cc7ab4e9c266ea50cc710b9
                                                  • Instruction Fuzzy Hash: 30210378D08248CFCF14CFAAD8845ECBBF6BB49301F06A42AD949AB211D7309945CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3661936611.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10dd000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction ID: fd71011960e0c51519482612666ffcd8a5fb3d6527f87a0e1fd10f883b673911
                                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction Fuzzy Hash: 5A11DF76504240DFCB16CF44D5C0B56BFB2FB84324F24C2A9D8490B297C33AE456CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3661936611.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10dd000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction ID: 421171922d3546c8ebe7e063047164fd0de5c246b74f2b4124a36db51bf36ff6
                                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                  • Instruction Fuzzy Hash: 4C11B176504280DFCB16CF54D5C4B16BFB2FB84324F24C6A9D8490B69BC336D456CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 936644ee2d9e0f1c66ade1dcce2a0bb41b107a85582e7cc646e800881b3cf412
                                                  • Instruction ID: dcaabe4a7bb3cb87f11c5dfa207e202497e799b7bc99b9950715c8fe4d5f363d
                                                  • Opcode Fuzzy Hash: 936644ee2d9e0f1c66ade1dcce2a0bb41b107a85582e7cc646e800881b3cf412
                                                  • Instruction Fuzzy Hash: AD2103B5C003499FCB20DF9AD884ACEBBF4FB48310F10841AE919A3210C375A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05b116a03e93a42864f80ee75caa8809ea389eb79fee669db326361a892baabe
                                                  • Instruction ID: 0a36c320e5e1c1ff02e17da6869df1cddc5a6bd67c4a969f3dc5a8d0da942d60
                                                  • Opcode Fuzzy Hash: 05b116a03e93a42864f80ee75caa8809ea389eb79fee669db326361a892baabe
                                                  • Instruction Fuzzy Hash: AB11E674D1520DDFCB44EFA4D9495AEBBBAFF4A301F20A16AD50AA3351EB305A01CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3663176490.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10ed000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction ID: 93e4bef80c547496cfa2731b24e51315127a4aca67b9d572dac2c17b6bc56391
                                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction Fuzzy Hash: 0E11BB79504280DFCB06CF54C6C4B15BBA2FB84324F24C6AED8894B296C33AD40ACB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bdfadc5b856b02cdb3744e88bf738ee9523279772afafb7f4ae990c58c736405
                                                  • Instruction ID: 87dbf4abff0f1308ebd28188afc29657abeb9dc33c07b9b4de58226e42640e4d
                                                  • Opcode Fuzzy Hash: bdfadc5b856b02cdb3744e88bf738ee9523279772afafb7f4ae990c58c736405
                                                  • Instruction Fuzzy Hash: 7811E2B5C003499FCB20DF9AD884ADEBFF4FB48320F50841AE919A7210C375A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e82979dbe67312c86ef080a2928f3e68069ede057454e24d016764c8c70f64eb
                                                  • Instruction ID: 75d7d1da56d197bbedaded5996f1debb7394b49b52aff444a2eb5b436999a802
                                                  • Opcode Fuzzy Hash: e82979dbe67312c86ef080a2928f3e68069ede057454e24d016764c8c70f64eb
                                                  • Instruction Fuzzy Hash: 4511FA74D19608DBEB04CFABC9443EEFBFAAF8A300F05E02BD519A6254DB7445068F54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 01fb6854382582fc9d6aa5829100e2e8d847e6e1a63b3dc8f4fccd816ef715da
                                                  • Instruction ID: 0a8568111ad6ddc0b5fbd94fce3bdce03ac92e9fd2699841f04a09fb869324d8
                                                  • Opcode Fuzzy Hash: 01fb6854382582fc9d6aa5829100e2e8d847e6e1a63b3dc8f4fccd816ef715da
                                                  • Instruction Fuzzy Hash: 80018C31F002159FCF65EFB988442AEBBFAFF48210B12047BCA05E7301E635C9418BA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6e5265787ce8c1eb9a399abb62624e2079d7c7fca29af6ec3b202dddf0277026
                                                  • Instruction ID: 5c0287e887d3a42022eab5a55024cf4d740ade8a49febdadb6c2bac76c7116d8
                                                  • Opcode Fuzzy Hash: 6e5265787ce8c1eb9a399abb62624e2079d7c7fca29af6ec3b202dddf0277026
                                                  • Instruction Fuzzy Hash: 6D11A5766083859FC703DB65D8116953F7AEF86350B0981E3D444DF267E5348D098765
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cf33967a1ba5333bdc95e06ade19409dcef4b185337334966439264fe7ef83d
                                                  • Instruction ID: 09f309b74833eba8b548b7155b5907757009bdf78958ff81cc32f22e888a91fc
                                                  • Opcode Fuzzy Hash: 5cf33967a1ba5333bdc95e06ade19409dcef4b185337334966439264fe7ef83d
                                                  • Instruction Fuzzy Hash: BF11C0B1D016189BEB18CFABC94579EFAF7BFC8300F04C16AD408A6264DB7409468F90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0ec8b5a532ad38221ccd513104ddd6ee0d02b1052dc0078874b98be9b01526a7
                                                  • Instruction ID: 8d8e37f953aace47ea3687e43449accb10f0c55304269c04cb15993d1b991a06
                                                  • Opcode Fuzzy Hash: 0ec8b5a532ad38221ccd513104ddd6ee0d02b1052dc0078874b98be9b01526a7
                                                  • Instruction Fuzzy Hash: FF1118B4D1920DDFCB00CFA9D5452AEBFF5AB4A300F1094AAD959E3352EB344A02DB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 21d1a8e1a15884d996be23485bb20f82ece156d71142da52f3685aebae3d6094
                                                  • Instruction ID: 4618773c4fcc9a809ced740ecd9a1be1ec68e8344e845b58d6ac6ccd08761d5d
                                                  • Opcode Fuzzy Hash: 21d1a8e1a15884d996be23485bb20f82ece156d71142da52f3685aebae3d6094
                                                  • Instruction Fuzzy Hash: 3C11CE75E042499FCB14DFA8D8007EDBBB2FB49311F1181ABD958D7380EB344A01DB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 636d8a026feb974b96c4e5e6e12e7ce7c639b13bb713ca3efdef6920c3ec382e
                                                  • Instruction ID: b2e22a73ce0f839e7611c23036a7afb1ef0955912ea4e66da187c39f20574f1d
                                                  • Opcode Fuzzy Hash: 636d8a026feb974b96c4e5e6e12e7ce7c639b13bb713ca3efdef6920c3ec382e
                                                  • Instruction Fuzzy Hash: 1811F534E50308AFEB00CFE0E895BADBBB6FB49701F105016F90AAB794CB705941CB04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7d97c0f67c383a5484c9f8682c3faa8e527c4ae71f5f3047359f36e35875ad1
                                                  • Instruction ID: 25f0ce5bcd46d12dbea1c1466b2ffa8ef701b361c961c9ce33fc4913c4d7292b
                                                  • Opcode Fuzzy Hash: e7d97c0f67c383a5484c9f8682c3faa8e527c4ae71f5f3047359f36e35875ad1
                                                  • Instruction Fuzzy Hash: D6113D34904219CFCB20DFA8D840B9CBBB5FB45315F1195A6E619AB384CB30AD85CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 162cf2a0e0c934df8025838259f49a5e248fb5c470fd2471632dabcf02f9b32a
                                                  • Instruction ID: 54ef8d3e4a187d4a134636408a81c00909fc99fb48cad76939ee04f01b6f2b7b
                                                  • Opcode Fuzzy Hash: 162cf2a0e0c934df8025838259f49a5e248fb5c470fd2471632dabcf02f9b32a
                                                  • Instruction Fuzzy Hash: B1118E75D18208CFDB10DF64D985AADBFFAFF09306701A12AE6468B356DB30E841CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 830298654aa8d23818853dbeaf89d348b6770b45ca2445b6eafcdbd945c358aa
                                                  • Instruction ID: 838803fc3be272512081ce45e31dff610b20f39d51e671d508047d202a811723
                                                  • Opcode Fuzzy Hash: 830298654aa8d23818853dbeaf89d348b6770b45ca2445b6eafcdbd945c358aa
                                                  • Instruction Fuzzy Hash: 7101D4B090C244DFCB04CF55E9409BCBFBEBF4A301F16A1A7D1564B212C7308A05DB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1bc14e26459da599757786a54c3ac573afdfe01e61c9273e71e89e5b4b217fbb
                                                  • Instruction ID: 7059cf2129a3a18f74e2552b524a539598f0259d6f481a997baf0b825250abba
                                                  • Opcode Fuzzy Hash: 1bc14e26459da599757786a54c3ac573afdfe01e61c9273e71e89e5b4b217fbb
                                                  • Instruction Fuzzy Hash: 5D11AD38A08208EFCB10DBA8D685BACBFF6BB49200F1981D5A5599F352CA30CE01DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 71bc9ed96b910d02f7349b08ba922003443c2ac37ef77082928dddce48ed56be
                                                  • Instruction ID: d5d9a207095426cb9aa653ae0d63ad65c488a2ecc1c37fc2a0eb7aeb617dccca
                                                  • Opcode Fuzzy Hash: 71bc9ed96b910d02f7349b08ba922003443c2ac37ef77082928dddce48ed56be
                                                  • Instruction Fuzzy Hash: DE113C70E15218DFCB08CF6AE9409ADBBFBBF89301F00D12AE509A7314DB309901CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 316f00720de7f6b778d238f790d79dd7b449e52ec8056d9005786fb2dd3f57c8
                                                  • Instruction ID: ad698e53cb621c646443966984840ae5eab12b0d26c33dd28ee3ddadd850345a
                                                  • Opcode Fuzzy Hash: 316f00720de7f6b778d238f790d79dd7b449e52ec8056d9005786fb2dd3f57c8
                                                  • Instruction Fuzzy Hash: 3411F8B4D08249DFCB04DFA5C5856AEBFFAFB4A301F1094AAD459A3351DB348A02CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 85b3d0f0c4d3689dc9e10fc6e95bd80bf9555c8f9e208f6b76de91b24e130b3e
                                                  • Instruction ID: 8be2e8f0b0a32cd68470313f196443258305087ebb16f811d6ca719dff3c8408
                                                  • Opcode Fuzzy Hash: 85b3d0f0c4d3689dc9e10fc6e95bd80bf9555c8f9e208f6b76de91b24e130b3e
                                                  • Instruction Fuzzy Hash: 2B01B5B4D18248EFC704EF75D4456AD7FBAFF4A201F5060A7E41D9B291DA348A05CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e43bc90c70e0fe682210eef942fa3061a6e5f0506d6d83ceab2410d9f381e80f
                                                  • Instruction ID: 0e95bfa44d543ad9386fa540f562ba11df37edab807b6c401388e974ab027303
                                                  • Opcode Fuzzy Hash: e43bc90c70e0fe682210eef942fa3061a6e5f0506d6d83ceab2410d9f381e80f
                                                  • Instruction Fuzzy Hash: 6711AC34A503089FEB04CF94E896B9DBBBAFB49711F145116F90AAB7D4CF705941CB05
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b24e9400bf82e063ea11db09a9cfb7a8ad580a2b8a17e8e08e08bbbe81ad653
                                                  • Instruction ID: 2026cd8383b85b372b8011c83fec30e36ab6fe70a7379a87433cda81067fc157
                                                  • Opcode Fuzzy Hash: 6b24e9400bf82e063ea11db09a9cfb7a8ad580a2b8a17e8e08e08bbbe81ad653
                                                  • Instruction Fuzzy Hash: 2301F23192D2489FCB048BA494193FE7BB9EB4A201F0564ABC245972B2DB754A19CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b0251f08df3734f67c42dd458953005b077bd839df6f9de3195bf036e86a71bc
                                                  • Instruction ID: 4994f15d268ddb6d2d1dafbfd56652ebdc58a9871f981b31348bb44161a4b871
                                                  • Opcode Fuzzy Hash: b0251f08df3734f67c42dd458953005b077bd839df6f9de3195bf036e86a71bc
                                                  • Instruction Fuzzy Hash: 6111F7B4D0820DDFCB44EFA9C5456AEBBFABB49300F10916AD919A3300EB309A01CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 68ae947a67034715e8a5c29eaba52658ba622165ccfa7cefbab9c369cb8d6046
                                                  • Instruction ID: 675949185cb5141da96ac46a360a88101e168f388d355c55be68f23bbe2aaca1
                                                  • Opcode Fuzzy Hash: 68ae947a67034715e8a5c29eaba52658ba622165ccfa7cefbab9c369cb8d6046
                                                  • Instruction Fuzzy Hash: C1112874E10309CFCB14DFA4E6855ACBFBAFB89705B10512AE50A9F345DB30A842CF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e483b9c87adb06d02722115d6d2915c99ddc0265a3a2f5aa9374ae5b9965dd11
                                                  • Instruction ID: f1835a6f4b4d352bfbd78a38208b7ecaf089b4da03dfb84a2865becd4fd78310
                                                  • Opcode Fuzzy Hash: e483b9c87adb06d02722115d6d2915c99ddc0265a3a2f5aa9374ae5b9965dd11
                                                  • Instruction Fuzzy Hash: FF111078914218CFDB24DFA4D8887ACBBBAFB49305F11A06AD44AE7385DB305985CF11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3661936611.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10dd000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eab81512678f4d3764ef68915f3829b6caf84a3a4e56e818a1160ffeabc10622
                                                  • Instruction ID: 522a8338b6d2be1823c06e06739ee15dd054b13db4559e37ab87889ca8e526a9
                                                  • Opcode Fuzzy Hash: eab81512678f4d3764ef68915f3829b6caf84a3a4e56e818a1160ffeabc10622
                                                  • Instruction Fuzzy Hash: 69012B315043809AF7605E55CDC4B2ABFDCEF41225F08C5DAED890F2C2E2399841CBB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1daf0eb22dc58e1dbddd15e9c9e354b94b8976f77e9541c75f546fc4c58326be
                                                  • Instruction ID: 70ad08e43e1bc0b2df93078c997d03d0a2e9b53da5688102dd6fff34844f95ae
                                                  • Opcode Fuzzy Hash: 1daf0eb22dc58e1dbddd15e9c9e354b94b8976f77e9541c75f546fc4c58326be
                                                  • Instruction Fuzzy Hash: 19118B39C18349CFCB11CF74D8946ACBFBAFB4A215F11626AD04A9B396CB306885CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0a2bb03ac0ff66b5c7b3ffd6176756346f0c72855a3a26976e407316a6e122c7
                                                  • Instruction ID: 0fb188b1b26cce058071d8ac7c20db4c2a3c870eebd594cdc61942c82b2357b6
                                                  • Opcode Fuzzy Hash: 0a2bb03ac0ff66b5c7b3ffd6176756346f0c72855a3a26976e407316a6e122c7
                                                  • Instruction Fuzzy Hash: 3B115134914259CFDB20DF68D845B9CBFB9FB05304F11929AE50AAB395CB70AD86CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c2e38970a3053678c7126d87981e95b51ac84d8c807fe14071b2d16a316477dc
                                                  • Instruction ID: ebc046aa3bf943ffd568b54f595046cb2221b3bac2bd58a236c715e738b5d3ec
                                                  • Opcode Fuzzy Hash: c2e38970a3053678c7126d87981e95b51ac84d8c807fe14071b2d16a316477dc
                                                  • Instruction Fuzzy Hash: 8CF06235E1921897CB048E65A8151FDBB7DEB8B301F01702AD64EB3241DA3099048754
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b20fa56b79ed38e02ce1fd952be526c93310229c4680f6d71e9ba535260737b1
                                                  • Instruction ID: 1b56db78bce69d8f7efaa875aa7034c6ee17114c0f27f5a35e7141e783c9b8ac
                                                  • Opcode Fuzzy Hash: b20fa56b79ed38e02ce1fd952be526c93310229c4680f6d71e9ba535260737b1
                                                  • Instruction Fuzzy Hash: 7C0129B4D1920DDFCB00DFA9D5452AEBFF9BB49300F10906AD919E3351EB304A40CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 612c0f26db49a98331f8ca404de040b0f605f53eea78b6bf6d7f88f546004bea
                                                  • Instruction ID: 6b38b65d2288badc473275fbca524160d9f39684b676e36ac50cee302205d328
                                                  • Opcode Fuzzy Hash: 612c0f26db49a98331f8ca404de040b0f605f53eea78b6bf6d7f88f546004bea
                                                  • Instruction Fuzzy Hash: EC01FB74A09108EFDB04DFA8DA85AADBBFABF49300F19D095A5499B355DA31DE00DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f5fe8995fbb6fdf28c7139413817d59d2d4dd20d27825063b812eae09b3fb4f
                                                  • Instruction ID: 6741b5de55faf620f9e4f64a6a0a670f267f467767b8ec921e5a15e2b9d16205
                                                  • Opcode Fuzzy Hash: 3f5fe8995fbb6fdf28c7139413817d59d2d4dd20d27825063b812eae09b3fb4f
                                                  • Instruction Fuzzy Hash: F4F0AF7090C208EBCB04CF56E9409BCBBFEBF4A300F05A2A6D55A5B212CB30DA45DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fb70eb81c57cb8dcfe541c0b3612916c09787a9661eaa5b5db9f43c0ab2f8b3b
                                                  • Instruction ID: 685d2db293833628f193452eb33420db543b8a551b992a4fd088603a01186bb9
                                                  • Opcode Fuzzy Hash: fb70eb81c57cb8dcfe541c0b3612916c09787a9661eaa5b5db9f43c0ab2f8b3b
                                                  • Instruction Fuzzy Hash: D4017E78E2924C9FCB00CFE4D5944ADBBB6FB4A300B519016E915AB359DB309D01DF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d7495756a8ded3ec2e7bc6a8b6b4d84c0fedb192d09aaed4576224cd2890446e
                                                  • Instruction ID: 39f25a2f1ed97221dd4821b84e0c00d5ecf258bfc6e3f3aa449dd74af2417397
                                                  • Opcode Fuzzy Hash: d7495756a8ded3ec2e7bc6a8b6b4d84c0fedb192d09aaed4576224cd2890446e
                                                  • Instruction Fuzzy Hash: 1FF044B0D14208FFCB04DFB5D4456BDBBB9FF4A200F40A0AAE50AA7290DE305A00CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0bb8d972a5d0292140b2451a670246d55bd99aeddc9d729fe4a42d6339fb922f
                                                  • Instruction ID: e3040abe74aac6c7670d5fd7ea4324791b46a560ba78acf46e69df96203de7ba
                                                  • Opcode Fuzzy Hash: 0bb8d972a5d0292140b2451a670246d55bd99aeddc9d729fe4a42d6339fb922f
                                                  • Instruction Fuzzy Hash: 4DF0DC75419288AFCB11CFB8D90A798BFF4EF0A215F1402DADA48C72A2D6305D02D742
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de363b35976966fa107576e52d805b54a77fa7fe9aaf568f291133412e9da01c
                                                  • Instruction ID: fea3130d5453692223eb5684d0ade3949cc8a89c03bce26b3f749537f7d827b5
                                                  • Opcode Fuzzy Hash: de363b35976966fa107576e52d805b54a77fa7fe9aaf568f291133412e9da01c
                                                  • Instruction Fuzzy Hash: 7F01E479E00208DFCF01CFD8D985AEDBBB6FF49311F215556E645AB621C7329952CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a6812663e7e75c3aca5f51515b010170887d7235582602533ebd2495c53369e9
                                                  • Instruction ID: 02734558abae27621f2c8f2de7fe3e89e347966402ad00008a017ce8bbd6ccfe
                                                  • Opcode Fuzzy Hash: a6812663e7e75c3aca5f51515b010170887d7235582602533ebd2495c53369e9
                                                  • Instruction Fuzzy Hash: 9DF0C2319082889FCB11DFB8C80669DBFB2EF02214F6482DAC958573A2C6359A83DB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7d2938b05ae3a182a96f0bd52d76548c94b85b28066bcebf5d5554f50aa77742
                                                  • Instruction ID: 67905babfb46e7c61caf23699f52f9b2f5ead1fce27d1b7b4ef95a705ed9b2a0
                                                  • Opcode Fuzzy Hash: 7d2938b05ae3a182a96f0bd52d76548c94b85b28066bcebf5d5554f50aa77742
                                                  • Instruction Fuzzy Hash: 65017D74809388AFCB25DBB9C58175C3FB0AF03211F1001EBD8188F291D7358E06C781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 716fcdf56538985bf2c6468217af421e0e3dbf55a9fba1f1bcaceff42533893e
                                                  • Instruction ID: 283dd35d2271360dd3a82208fa8b7ce80d503801b0e9517c7c7fb21d7ba59b26
                                                  • Opcode Fuzzy Hash: 716fcdf56538985bf2c6468217af421e0e3dbf55a9fba1f1bcaceff42533893e
                                                  • Instruction Fuzzy Hash: 8E01FF2244C2C45FCB27D7B899A26A83FB1AF43111B2902DFC9D88B1B3D525094BC742
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c4e77c6e837d0b34f4944ba9ffd985b82bf20a6f8b6b7c482e711756433531b8
                                                  • Instruction ID: 0c390292e1cd9724775a255667b49d50a9822460931003a45f5fe85ac08099f1
                                                  • Opcode Fuzzy Hash: c4e77c6e837d0b34f4944ba9ffd985b82bf20a6f8b6b7c482e711756433531b8
                                                  • Instruction Fuzzy Hash: 6801FB70E45208DFEB10CFA5D845BEDB7B6EF49300F119057E519B3341CA7099808F24
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3661936611.00000000010DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010DD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_10dd000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1047077e08966884dc01b3a01ec359895f315c8a59d86d9c66149bb8d4355356
                                                  • Instruction ID: 36d37cff5f0974318f263f6d01999ad64f4a3f7b8ee50fcfbeaaf0abbfab1cc4
                                                  • Opcode Fuzzy Hash: 1047077e08966884dc01b3a01ec359895f315c8a59d86d9c66149bb8d4355356
                                                  • Instruction Fuzzy Hash: 9EF062714043849EE7609E19C988B66FFD8EB91634F18C59AED484A2C6D2799844CBB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 38f9319975758d7757f74efaf29b77c1b0e80f46bca4fe5ebb7aba5e64d020a9
                                                  • Instruction ID: 97b02b741d07545d3f9f4a07696cc2e9f94e5167e9b7e0f764aaeeec2da80398
                                                  • Opcode Fuzzy Hash: 38f9319975758d7757f74efaf29b77c1b0e80f46bca4fe5ebb7aba5e64d020a9
                                                  • Instruction Fuzzy Hash: 4FF0AFB5A0D3198FCB65CF18CC907AC77BABB45201F0758AA824997266DB308A49CB02
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 89d35645554b18debca658b11e40c228ef12a03c1587df6311652b0b8ca6f727
                                                  • Instruction ID: 6a445e8ba3f2c7398c34aa24cc575f99fa7da52af02686c52b22d6a7c07682d6
                                                  • Opcode Fuzzy Hash: 89d35645554b18debca658b11e40c228ef12a03c1587df6311652b0b8ca6f727
                                                  • Instruction Fuzzy Hash: 92F0BB71C0D288DFDB18CFA7D9512ADBF77AB86200F15909BC59897212D7704901C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 401a6a7018636a5e85a9e6af4914731741d86d45c74a5ea2ddb765219499ef08
                                                  • Instruction ID: 96639bcb0b5f3a43deb5386bd0a79c3869f5e3b49f9c86a112658c78379b312f
                                                  • Opcode Fuzzy Hash: 401a6a7018636a5e85a9e6af4914731741d86d45c74a5ea2ddb765219499ef08
                                                  • Instruction Fuzzy Hash: F701FB39D14318CFDB10DFA4E9956ACBFBAFB49305F11652AD01A9B355CB306885CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1be2c81a1a2a8901eaa3622345b12bd71d24488d58d6c51300c4feffe7a063b4
                                                  • Instruction ID: b4316aec7e878b067beb848eb674b46a8ce01f8c462f69a338eb172ee0e04925
                                                  • Opcode Fuzzy Hash: 1be2c81a1a2a8901eaa3622345b12bd71d24488d58d6c51300c4feffe7a063b4
                                                  • Instruction Fuzzy Hash: 20F01D74A0D3298FCB60DF58D9907AC77BABB49301F1299DAD24997219CB305A88CF12
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6d9e1b88d0bb1f2a12513de137ff993af61a13e707651269498e2a520bbafb07
                                                  • Instruction ID: 2a880e6b4325cb8e8995a907211a5443572a56887c6af0fa6fd283eaee4d9e2e
                                                  • Opcode Fuzzy Hash: 6d9e1b88d0bb1f2a12513de137ff993af61a13e707651269498e2a520bbafb07
                                                  • Instruction Fuzzy Hash: CCE0393882D208CBCB10CF50E9150F9BBBAF74B307F1A3453D54E92112DB309A45CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 01cbedde274bceffd0ca53c4d4d5189a8d49d43c10db3261858a317e01a2860b
                                                  • Instruction ID: eebbc2df2c2d3ce6c0e8552cab19f5ae7107c9c6837b4e1595d07234a9fa94b1
                                                  • Opcode Fuzzy Hash: 01cbedde274bceffd0ca53c4d4d5189a8d49d43c10db3261858a317e01a2860b
                                                  • Instruction Fuzzy Hash: 62F0E57188D288DBEB09DBA4D5812A83FB5AB42205F6551DBC58883252C6744D07C792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3cd4b0becf48b843151dd994197e6ff4a7fc3feb0d9aff1cddab5360a5894307
                                                  • Instruction ID: 3c4f78a330656199d481c5637bf1cdb1cdad4020988cd50a465d0e3654bcd111
                                                  • Opcode Fuzzy Hash: 3cd4b0becf48b843151dd994197e6ff4a7fc3feb0d9aff1cddab5360a5894307
                                                  • Instruction Fuzzy Hash: 60F02734D18244EBDB24EBB5D8057A87B7EEB49302F01D92A871597395DE70C407CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e6096ee04141d50c2fea13a0c57bd73e62a2eb80891f90856e2ad8b7a48449da
                                                  • Instruction ID: fa3e3821cfefd9e4f599108effe5e5e399e22e4da8cbd975d634dba7b07add77
                                                  • Opcode Fuzzy Hash: e6096ee04141d50c2fea13a0c57bd73e62a2eb80891f90856e2ad8b7a48449da
                                                  • Instruction Fuzzy Hash: 44F0E57580E388EBDB16DB75C9013A83F76AB13206F2941DFC94A47392C6394A45D782
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fcf2142797a0a8ddd0105081944386ec0a50430a234affea50fa79f5160cd5a4
                                                  • Instruction ID: 455788e3b51a2f1ded706c0fe5e648bda2bba35ee3ed11b5abf10f9c2b33cc07
                                                  • Opcode Fuzzy Hash: fcf2142797a0a8ddd0105081944386ec0a50430a234affea50fa79f5160cd5a4
                                                  • Instruction Fuzzy Hash: D1F03A74D1120ADFEB50EFA4C50679EBBF4EB04201F61882B8554E6240E7B986428FC1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6080235574d3278af7847df5c1660bcda742221b1fc63af2ad1e3d7ae263a367
                                                  • Instruction ID: c5a2500548b8a0f1c2c59b8c50faa1c074f9d578115c8c9da24e4169ebca5758
                                                  • Opcode Fuzzy Hash: 6080235574d3278af7847df5c1660bcda742221b1fc63af2ad1e3d7ae263a367
                                                  • Instruction Fuzzy Hash: 4BF0A7B4A0D319CFCF55CF14CC905EC77BAFB49201F039966C10996125CB305949CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e9ed2ef6d3124185a1ab66b23400ad51794d8ee8e05621a709633685f31ea568
                                                  • Instruction ID: eda25a3917523ceb7f961ac71e8b611d8c1d313e3db4551dc1b8b5d46b5363d1
                                                  • Opcode Fuzzy Hash: e9ed2ef6d3124185a1ab66b23400ad51794d8ee8e05621a709633685f31ea568
                                                  • Instruction Fuzzy Hash: 5EE02035A4D1C85BC705D674D5023B83F7ADF03519F5411C7C99D432938D250D47C345
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3120eb47501777bb902df38cd58f1f2126e6c16306f1e6f6c4eb265ace3ea8f4
                                                  • Instruction ID: 0f662d455ab35a07d09ac51c41df1396b45adcd0048addf63a85444fc6fb1fe9
                                                  • Opcode Fuzzy Hash: 3120eb47501777bb902df38cd58f1f2126e6c16306f1e6f6c4eb265ace3ea8f4
                                                  • Instruction Fuzzy Hash: D0F0BD7490621ACFDB60CF24D980AA9BBB5AB19200F0120A6E91EA3751E630AA81CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 06a201a29a253d3c25e78cf0fd472966ad4587305ccc4bd00499d17befa7d5f7
                                                  • Instruction ID: 68b228243a769f45d7dcb109cf800af0066e01417170dec6e805c0db719f18de
                                                  • Opcode Fuzzy Hash: 06a201a29a253d3c25e78cf0fd472966ad4587305ccc4bd00499d17befa7d5f7
                                                  • Instruction Fuzzy Hash: 56F08C70D29388EFCB16DFB8C0512ACBFB2EF4A200F5084FAD44497210D6354A46DF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bfaea9b0b6b5b09ec311d02c7a4d04e1665b96f883eb523b661ba41076190d9c
                                                  • Instruction ID: 098a13819a644eeae9aac69d7d34742de239da8a99b28fc0250a6669c83dd811
                                                  • Opcode Fuzzy Hash: bfaea9b0b6b5b09ec311d02c7a4d04e1665b96f883eb523b661ba41076190d9c
                                                  • Instruction Fuzzy Hash: 31F0E534D182089BDB24EBB5DC047A9BBBEAB49301F00D926820597284CE70D446CB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 417ed1a3b8f68d8ad3476bf559eda705354031732777b12f8c9a449f8dd2a335
                                                  • Instruction ID: 7a42e9dd9ade1d5c9270dfb36af2f7c1b606f30e68eadd7d25c0871e10ad8ba9
                                                  • Opcode Fuzzy Hash: 417ed1a3b8f68d8ad3476bf559eda705354031732777b12f8c9a449f8dd2a335
                                                  • Instruction Fuzzy Hash: 25F08234909244DFC751CF24E95596C7FF9BF4A201B056186E549CB153CB34D406CF00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4e7c70e4760973355c1a6115c3b1e9758192b7af6ea32fef6292cb6eecf14030
                                                  • Instruction ID: 119477e5f15c96bf6cdd8f150c8dfeac381cc90e194e3a192efb5633134549fb
                                                  • Opcode Fuzzy Hash: 4e7c70e4760973355c1a6115c3b1e9758192b7af6ea32fef6292cb6eecf14030
                                                  • Instruction Fuzzy Hash: 26F03974D1420CABDF44DFA9D44179CBBF8EB49301F5080AA9818E7384EA385A42CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a5801ee4131789e587570754eeb22032b7719c50bf1ccabb5d5117cf4b65c56
                                                  • Instruction ID: 6104a12eadb40181752b193d8145733ef3743be1180e6e18cd80b68b19c7455e
                                                  • Opcode Fuzzy Hash: 8a5801ee4131789e587570754eeb22032b7719c50bf1ccabb5d5117cf4b65c56
                                                  • Instruction Fuzzy Hash: CAE0E675D5910CDBDB00DFA4E9445FDBB79DB4B326B017417E14DA2500CA3045548B15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1ed119ae8f497baba013fbf324542fd79c7028f4076b89a8af11a3f9cc9c055c
                                                  • Instruction ID: 2fef26eea3e2178992d9cd9e880893b86f2d8a79b2debbbfcaef65b18f131097
                                                  • Opcode Fuzzy Hash: 1ed119ae8f497baba013fbf324542fd79c7028f4076b89a8af11a3f9cc9c055c
                                                  • Instruction Fuzzy Hash: 3EE09274D2E508CBEB04CF66D8041BDBBBAEB8F300F05B027D54AA2605DA3481128F19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 130d7f60792b3bd4a909586ae29a4b71e92cfaf09018ca6f202f1bf36a52da69
                                                  • Instruction ID: 7c44f66a3c069b810a9131a105faaa0ccdcca004fa9c33fc57371be6fa269723
                                                  • Opcode Fuzzy Hash: 130d7f60792b3bd4a909586ae29a4b71e92cfaf09018ca6f202f1bf36a52da69
                                                  • Instruction Fuzzy Hash: D8E01A39E1921CCBCF10DFA8E8405ECBBB9FB4D315B015526E549A7200D63095098B55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 69925f215bcacfb85723b1b266bd2f3b35d8887bc1cca8a20586af319f85ec21
                                                  • Instruction ID: 1636e850d23b68d1560ef258e00f76703185791005df66021e3f227b7198101e
                                                  • Opcode Fuzzy Hash: 69925f215bcacfb85723b1b266bd2f3b35d8887bc1cca8a20586af319f85ec21
                                                  • Instruction Fuzzy Hash: 0CF03978D1420CEBCF04EFA8D40569CBBB9FB49301F00C0AAE918A7340DA355A51DF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f4ef9ce0675655ff3a1ebbc55ab6d34fa917fcac08148fd787a18b56f4904134
                                                  • Instruction ID: d10c06a75ca26d195c07552d3a6c1bf86e23d4380ba5b019919d297494fd0238
                                                  • Opcode Fuzzy Hash: f4ef9ce0675655ff3a1ebbc55ab6d34fa917fcac08148fd787a18b56f4904134
                                                  • Instruction Fuzzy Hash: 29E026718093C4EFD719DAB5C5107683F36FB03106F1800DFC5188B252D9768D85E381
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c526dd5fc40338e266b6bc9675579ee96b01de0db70371975d8ecd22c4f3d772
                                                  • Instruction ID: 0fb3a7def83407ea3034501d7d0d2e94afa95fda7f9357c7518221a91bb7986b
                                                  • Opcode Fuzzy Hash: c526dd5fc40338e266b6bc9675579ee96b01de0db70371975d8ecd22c4f3d772
                                                  • Instruction Fuzzy Hash: 69F06D35A09288AFCB05CFA4C5A56ACBFB4EF06205F1800CAD4868B361D6385E02DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 653ad97d462e9530cae03adff76b1b47c6a6355a45a27594716d942b737107fe
                                                  • Instruction ID: 02c7ff0751b88eb71c0ddeba917ab3a5eca08463f35f4fc232f857efe35f9620
                                                  • Opcode Fuzzy Hash: 653ad97d462e9530cae03adff76b1b47c6a6355a45a27594716d942b737107fe
                                                  • Instruction Fuzzy Hash: BBE0C270D4130ADFEB50EFB8D4052AEBBF4EB08200FA0886AC504E6240EBB986418FD1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b09f3cb03ea76045a324ab1529edc73b32c985f8fc225f4a4cf1eda2231b0d4a
                                                  • Instruction ID: c8f8664367402879c7b81860261db95a45cfcf0f1027a2bcf8e25e8a4004cd51
                                                  • Opcode Fuzzy Hash: b09f3cb03ea76045a324ab1529edc73b32c985f8fc225f4a4cf1eda2231b0d4a
                                                  • Instruction Fuzzy Hash: F2E0D87460D7198FCF51DA24D8C465877BDB741205F1259BA834985119DB300A88CF01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af0751cd26697fe2d4356a9d028aa2d77db07ecaf5b0b4ac30a84e044d85faf9
                                                  • Instruction ID: 275b455106e4852a8fc974760d66a2938a5897c24ae69ffc8dd18539bdc345a0
                                                  • Opcode Fuzzy Hash: af0751cd26697fe2d4356a9d028aa2d77db07ecaf5b0b4ac30a84e044d85faf9
                                                  • Instruction Fuzzy Hash: 2FE0DF75909288AFD720DBA4DE0575DBBF8AB46201F21109FD845C3340D6790E00CB42
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e4b69376113683934502d5ba4941562555f1df7c45622af472a021536920d327
                                                  • Instruction ID: 09c705c90dfdd8fe316fe907eeb72223a8093e1fd9c90cb576f4c9f27a2d02e5
                                                  • Opcode Fuzzy Hash: e4b69376113683934502d5ba4941562555f1df7c45622af472a021536920d327
                                                  • Instruction Fuzzy Hash: 42E0E574E1520CABCB14EFA9D44139DBBF8EB85301F1081AAD918A7394DA345A41DB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b8081681622a8768bdf83a56d9d6298d47eda2be708dfeba3bba1f55c7303dd7
                                                  • Instruction ID: bb9a5e0e79fbeb7168f1cdddbd6508328da41ff7b1a3022af4a4ba76fb4ad551
                                                  • Opcode Fuzzy Hash: b8081681622a8768bdf83a56d9d6298d47eda2be708dfeba3bba1f55c7303dd7
                                                  • Instruction Fuzzy Hash: 0BE04F3161A204CFDB15CF64E850DA8B779FF5A303B0150E6E50A87262CB32D951CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a727340e145e3dc7cff6b6d4b2a4dc8903c3fe7525b4a17974491b08cb278e63
                                                  • Instruction ID: fdbd8b73cca7cca942c3cd5397f4af2bb880e0cc39510b4a99fa1c10bbc3945e
                                                  • Opcode Fuzzy Hash: a727340e145e3dc7cff6b6d4b2a4dc8903c3fe7525b4a17974491b08cb278e63
                                                  • Instruction Fuzzy Hash: 1AE0EE70D0520CEFCB54EFA8D50469DBBB5BB48300F1081AA9918A2340EA399A91DF84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34d6026e9acc3a241cbdb24d19d11fd37aef93d7ddf909736415ddf0d572a4df
                                                  • Instruction ID: a110caf5e281e5ec3abffe2d49f69629cefc775c6dab50cb43a400bf2f645c4f
                                                  • Opcode Fuzzy Hash: 34d6026e9acc3a241cbdb24d19d11fd37aef93d7ddf909736415ddf0d572a4df
                                                  • Instruction Fuzzy Hash: 16E0EC7091D20CEBDB04DFA4E9056BCBBBDA746302F5451AA950A12350CA345945D745
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5ef459f8687e3090d964931efbceebd5394cb99616aee4c58d7b17c31343cbda
                                                  • Instruction ID: e6df68911e6bad8892b95be5dc9c528273c40459c21e5482d4a7ca00cf705b76
                                                  • Opcode Fuzzy Hash: 5ef459f8687e3090d964931efbceebd5394cb99616aee4c58d7b17c31343cbda
                                                  • Instruction Fuzzy Hash: 42D01270809208EBDB14EFA5D9056AD7F7DAB42305F5041AEC50917390CB755945DB85
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8d013de09089741792934667611b0d47fb14389cce37c15642eeb899b0ba5fa
                                                  • Instruction ID: 38df75c43a0aa23590c33af3b29f0e5aefc3478d430f2c3c0eca898f79a54df3
                                                  • Opcode Fuzzy Hash: c8d013de09089741792934667611b0d47fb14389cce37c15642eeb899b0ba5fa
                                                  • Instruction Fuzzy Hash: F2E01274911118DFDB54DF24EC94BAC7BBAFB94601F1092B6D44EAB344CA306D86CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 94f73c37b8974afa0485d0bf0feef9cd6299373b8ff455bda6b947e0b9d1b78b
                                                  • Instruction ID: 34ca005027af50e21b1b72315dae4f4d376dbd37acb882dc7fa28c7a23ae47fc
                                                  • Opcode Fuzzy Hash: 94f73c37b8974afa0485d0bf0feef9cd6299373b8ff455bda6b947e0b9d1b78b
                                                  • Instruction Fuzzy Hash: 1DE0B674915208EFCB54DFB8D54565CBBF4AB09205F2041A9D909D7360EA309E54DB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 788b4d4f9e411724774f7e0376da48a37b0843a318909269c306c851e0ba4373
                                                  • Instruction ID: 5e05856b7cb3bfb92e542abcba75b164be021e371ebbeb3cc1f108c50bda1abb
                                                  • Opcode Fuzzy Hash: 788b4d4f9e411724774f7e0376da48a37b0843a318909269c306c851e0ba4373
                                                  • Instruction Fuzzy Hash: 1CE01234D08208EFCB04DFA9D1456ACBBB4AF49201F1080EAE90597360DA349E00DB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 163847172c619e5135d1953634cea41f19aad1963829b630d0df4e0c906c680a
                                                  • Instruction ID: 9905762d4f47ee1a1a6db010069b206009474ce2ee0de5ef65d66c94a2920b79
                                                  • Opcode Fuzzy Hash: 163847172c619e5135d1953634cea41f19aad1963829b630d0df4e0c906c680a
                                                  • Instruction Fuzzy Hash: F0E04F70809288AFCB15DFB8C1926ACBFB8EF06301F1448EFD485972A1CB345A86D702
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2da069f0736919f2896515be346bb4463a5f087c110be75f898f8f72ac10d470
                                                  • Instruction ID: 02502c7357bfd748d765adcff2775e5bef4be1e9b553f3f7398727c5712518b3
                                                  • Opcode Fuzzy Hash: 2da069f0736919f2896515be346bb4463a5f087c110be75f898f8f72ac10d470
                                                  • Instruction Fuzzy Hash: 9EE0863491D3C4DFC716DB74855166D7FB8AF03102F0404EEC481575A1C6781E06EB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 37a4ecc9f3e4aedfd2fc29456983006b1dcce1e2d2c5b2ab56fc60917d3487f7
                                                  • Instruction ID: b8762750a69aaefdb1360a1e97b2347a88814fc378e6fa7435bd233b0ff7967c
                                                  • Opcode Fuzzy Hash: 37a4ecc9f3e4aedfd2fc29456983006b1dcce1e2d2c5b2ab56fc60917d3487f7
                                                  • Instruction Fuzzy Hash: BCD05E70C0920CEBCB04EFB8D9056BDBB7DAB41305FA041AAC90923380CA345E86D786
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34c6e8a24cd70521c5aa78fa844600156a7cd1ef0161a0056b9220e634359563
                                                  • Instruction ID: 9c2029cfd6841e4152244278283bd62be74ce39878b1edc1dabeb0055e22e0ba
                                                  • Opcode Fuzzy Hash: 34c6e8a24cd70521c5aa78fa844600156a7cd1ef0161a0056b9220e634359563
                                                  • Instruction Fuzzy Hash: 29D05B290393C8DBDF215FA2BC053647F283F43213F9510C3A149C64A1CE504D55C751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cee2c5094d48bc4f5f514e0a30b492ab17195892d67c6f490b3e2e134c375c83
                                                  • Instruction ID: 5b144d3dc62c4a999b3cd500bfefe8b9419bcffd48f62797b22a5407ea00247e
                                                  • Opcode Fuzzy Hash: cee2c5094d48bc4f5f514e0a30b492ab17195892d67c6f490b3e2e134c375c83
                                                  • Instruction Fuzzy Hash: 16D05E3084920CEBDB04DFA8E9417ADBBBCEB42305F5041AAC90923340CA705E56DB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 42505351d9400c0a524f9d90e6cb443a9447bc733fce097e9144ad35d94117dd
                                                  • Instruction ID: 2d76b23fbdfa2b2449dfddde461907860acc71395acc600bbf6e4012c3607182
                                                  • Opcode Fuzzy Hash: 42505351d9400c0a524f9d90e6cb443a9447bc733fce097e9144ad35d94117dd
                                                  • Instruction Fuzzy Hash: 5AD09E70E4A108CBEB00CFA9E8509FEB3BAAF4E200B11A017D555B3311D670D9008F24
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4529b6917805279e08537ecd50c7905906cb5fe7ac00957621d8c4b2909106b6
                                                  • Instruction ID: 4510b952a93cd4d5cd13a4482180770799d6260510e276b9f6244066ad844809
                                                  • Opcode Fuzzy Hash: 4529b6917805279e08537ecd50c7905906cb5fe7ac00957621d8c4b2909106b6
                                                  • Instruction Fuzzy Hash: 55D01770D1524CAFCB44EFB8D54639CBBB8AB04201F2000EA890893240EA305A54CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9da807e94d8204f42b4498cde4ae16d75e06a8d7a82de99b5a0a5e487a95cc16
                                                  • Instruction ID: 21ee7d3b26ff03b0b21cb3cf4e4d482753e5c8e7cdd199d06ce3ccc0933b8a32
                                                  • Opcode Fuzzy Hash: 9da807e94d8204f42b4498cde4ae16d75e06a8d7a82de99b5a0a5e487a95cc16
                                                  • Instruction Fuzzy Hash: 14D01774D1420CAFCB44EFB8D54639DBFB8AB04201F2040AA890893240EA305E84CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 46e5113463750636a06da781766131f6a9da01fbc95901710e65dbbf1e87f00c
                                                  • Instruction ID: 916fcd001248d5d37c8becb26cd67d2acd0f009d487cd062e0f6554a7d393ae0
                                                  • Opcode Fuzzy Hash: 46e5113463750636a06da781766131f6a9da01fbc95901710e65dbbf1e87f00c
                                                  • Instruction Fuzzy Hash: 9DD01770D1420CAFCB44EFB8D5463ACBBB8AB05201F5000AA8908A3240EA305A84CB82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ae82aa4c529a898b522d0688ebf8c846a2362ff343a4bb72b6bcb1e3f3054bfd
                                                  • Instruction ID: 42313acebc36eff6554486c7accf60aacc67966e44909cb732b8654307915725
                                                  • Opcode Fuzzy Hash: ae82aa4c529a898b522d0688ebf8c846a2362ff343a4bb72b6bcb1e3f3054bfd
                                                  • Instruction Fuzzy Hash: 52D05E34D1934CEBCB14EFB5910536CBFB8AB02202F5001FEC90426290DA754E54DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 475da8d51e83c47d993c3c0809f6b002f4ee619a4fe271292a7bfb68c3bcd58c
                                                  • Instruction ID: bbd0c33cd3cd2cb75e6bc7f6576f16285161144a7e3f72e4041fdf57bb84b462
                                                  • Opcode Fuzzy Hash: 475da8d51e83c47d993c3c0809f6b002f4ee619a4fe271292a7bfb68c3bcd58c
                                                  • Instruction Fuzzy Hash: 54D0A930406308EBC728DAA9C000729772CAB02201F0000ED850802290CA328E80C780
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a773231e9a531a3fdd94d8fed6f9f0aa7f1ada7b6a31cdf06f08ff2668bc9f5
                                                  • Instruction ID: 547fef2b254df18515714e54d8e6efee70d1e88d3fb7e505ba3cf243a81143a8
                                                  • Opcode Fuzzy Hash: 3a773231e9a531a3fdd94d8fed6f9f0aa7f1ada7b6a31cdf06f08ff2668bc9f5
                                                  • Instruction Fuzzy Hash: 3BD0C77590524CEFD710DFB9D60575DB7FCE705201F104095D909D3340DA755E40D751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3da1ba8a4408b53acd78123729eb51ef4f99d8f3052ee0496212d0e968da0ed2
                                                  • Instruction ID: fdb51a06d6389b2b54b95e5ef52761b20630224d3f5680fe91345845f2169e8a
                                                  • Opcode Fuzzy Hash: 3da1ba8a4408b53acd78123729eb51ef4f99d8f3052ee0496212d0e968da0ed2
                                                  • Instruction Fuzzy Hash: 67D012B051520CEBD714DFA5D516769FB7CE706602F411099A90993290DF751D00D795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d2de8669fcc7185af62569e439d7ce7f72f1bb11aa03a69c29670a2e196b8b65
                                                  • Instruction ID: 029b946acef8fcda2710413023511e0cdc3563fa005c9b820b53e7c9bba08fbc
                                                  • Opcode Fuzzy Hash: d2de8669fcc7185af62569e439d7ce7f72f1bb11aa03a69c29670a2e196b8b65
                                                  • Instruction Fuzzy Hash: 10C0127045524CBBCB24DAA9D501B6D777CE742211F4000AD9509532A0DE715D00D795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc879c0920d99b33863e17faba14e77d0461c0bb70be9962a9ac5bcd51fdbca4
                                                  • Instruction ID: e3e201180a3dabd268423e64669fc4e3d9b0e69ae10fae64fbe81ed5e3321b4c
                                                  • Opcode Fuzzy Hash: cc879c0920d99b33863e17faba14e77d0461c0bb70be9962a9ac5bcd51fdbca4
                                                  • Instruction Fuzzy Hash: 45C0807144A24CFFD714DFA9D50176DBB7CF702211F10019D961953251DE711E40D795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 771c9bf37327bab88c3f3f01fb6365fc8760d6ad44c1227562cb4ab95e65878e
                                                  • Instruction ID: 13eb7767e91d8bd87a070a31257e64c84ae45e5a29714d95ad20195daba3cf2c
                                                  • Opcode Fuzzy Hash: 771c9bf37327bab88c3f3f01fb6365fc8760d6ad44c1227562cb4ab95e65878e
                                                  • Instruction Fuzzy Hash: A9C08C3002420C97DB246FA5F90E3243F6C7B41203F442011B20E404608FB04814CB66
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ba394f38abf4a04d8cdc08b45709bf65ea0e8aa8a43d0d7d7bae355e8e78ce4
                                                  • Instruction ID: 5d0b5b8bc0a7b21a1b9db038d3e671fd437c4745dd0ea30c20299dee62586c0a
                                                  • Opcode Fuzzy Hash: 3ba394f38abf4a04d8cdc08b45709bf65ea0e8aa8a43d0d7d7bae355e8e78ce4
                                                  • Instruction Fuzzy Hash: D6C00230928309CFCB04DF50E9998BDBB7EEB4B202B21A115A55E6B2518F306904CB64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3fe6c08dab70100d25f08c3510916babfef654350edf39758301e9b757fb1099
                                                  • Instruction ID: e7bdc576af46505fe6fbb6bd490463809b2fcd13b6068159fcf2d6f151fd96f9
                                                  • Opcode Fuzzy Hash: 3fe6c08dab70100d25f08c3510916babfef654350edf39758301e9b757fb1099
                                                  • Instruction Fuzzy Hash: C1C01278A1068ADBCB10DFF0C25159C3B7AEB453067109624A0068BA08CA34AA0ACB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d17ceb91891771eb10ab559381b0f475de2d0d364be5690814517ff8d6480613
                                                  • Instruction ID: e77378cbd07938053b3677f20742f580a9864294ac6fe186801aabcf8ca98d7c
                                                  • Opcode Fuzzy Hash: d17ceb91891771eb10ab559381b0f475de2d0d364be5690814517ff8d6480613
                                                  • Instruction Fuzzy Hash: 9FB01234A3D10CCFC700CF94E864CEC773AFB4E2017109400E016231158B305C05CB00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                                  • API String ID: 0-1298971921
                                                  • Opcode ID: 4a43e5a1c7d798e3a8c592073e10a2fa3955bc1a242e4fdad20580206f016d35
                                                  • Instruction ID: 56b88d17a657a7ab29609d6c68c4c340017e4d4279c26bb6d6f65566cf3aa25b
                                                  • Opcode Fuzzy Hash: 4a43e5a1c7d798e3a8c592073e10a2fa3955bc1a242e4fdad20580206f016d35
                                                  • Instruction Fuzzy Hash: 26123830E11319CFDB64DF65D844A9DB7B2BF89301F2485A9D80AAB254DB719D82CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q
                                                  • API String ID: 0-3126353813
                                                  • Opcode ID: 0e4d3431268fb3abba3e3572080a5cdbbf9f4924de0a293574493a827114d1e7
                                                  • Instruction ID: 3996cfe9825feb8dd561ceaf33ee1734df921a557befc3ca0e77d508e13abfee
                                                  • Opcode Fuzzy Hash: 0e4d3431268fb3abba3e3572080a5cdbbf9f4924de0a293574493a827114d1e7
                                                  • Instruction Fuzzy Hash: 39028D30B11316CFDB54DB68D9507AEBBA2FF84310F288529D805AB354DA75EE82CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 62c7ac5dbaa0105d2c8c4c80dd2f5d00baee3d3a9d0b6f495f772fd7fafe0161
                                                  • Instruction ID: 17a52d1a02a52a0b19887a079b285dba0bbc51c58bc066a33da5d0ef9c9b3429
                                                  • Opcode Fuzzy Hash: 62c7ac5dbaa0105d2c8c4c80dd2f5d00baee3d3a9d0b6f495f772fd7fafe0161
                                                  • Instruction Fuzzy Hash: 0723FA31D10A19CEDB11EB68C8846ADF7B1FF99300F15D79AE45CA7221EB70AAC5CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3674259501.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_62a0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dda0399aab2538bfedf829af3426436ae3d75368c103ad8ee835ec3f4363eac9
                                                  • Instruction ID: 200e8380cffb5d2c2cfd33ccb810fb13b9b15b910429af0b7a81c91321a26b9d
                                                  • Opcode Fuzzy Hash: dda0399aab2538bfedf829af3426436ae3d75368c103ad8ee835ec3f4363eac9
                                                  • Instruction Fuzzy Hash: 2A329F34B102058FDB54DF68D990BAEBBB2FB88310F148529E805EB355DB79EC42CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 68335e4b8c04e00c44af4f0b034dd7dc8b51de7ba9f5522e4c268cede3e819f0
                                                  • Instruction ID: 5c333488d257a9bd7ad768daf3ada922b98cad3b0dbbf8d5eb04fb35ce8931b0
                                                  • Opcode Fuzzy Hash: 68335e4b8c04e00c44af4f0b034dd7dc8b51de7ba9f5522e4c268cede3e819f0
                                                  • Instruction Fuzzy Hash: 7EE10474E042598FDB14DFA8C580AAEBBF2FF89304F24816AD554AB356D730AD41CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 01b76e7efcb9d9e28609c49c30cce33bc677c2d6a691fbb451fe70138cf1c9a1
                                                  • Instruction ID: 11b9746ef631dd782dbd559d32f35ff0c3ee38d56890be3fd56dc287b293c00b
                                                  • Opcode Fuzzy Hash: 01b76e7efcb9d9e28609c49c30cce33bc677c2d6a691fbb451fe70138cf1c9a1
                                                  • Instruction Fuzzy Hash: AFE11774E042598FDB14DFA9C590AAEFBF2BF89304F24816AD514AB355D730AD42CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cc9eaf633fb5904e0315d9e5f02da58c4ad8073a527b71f9aa41aebd67588347
                                                  • Instruction ID: c122ef21613d57bddf8386e02130496b25ac1dbdf411404181714c911cf74fea
                                                  • Opcode Fuzzy Hash: cc9eaf633fb5904e0315d9e5f02da58c4ad8073a527b71f9aa41aebd67588347
                                                  • Instruction Fuzzy Hash: 6DE1D474E042598FDB14DFA9C580AAEBBF2FF89304F24816AD515AB355D730AD42CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c5b8e4c6852a6b3bfcb0fe8b964b33b776a93587635dfbe743045ad49ea6cca3
                                                  • Instruction ID: 2b52baabd4d821c2d4ac9e23d832a721c9301b002c5c1e4c4198a43645e44c0a
                                                  • Opcode Fuzzy Hash: c5b8e4c6852a6b3bfcb0fe8b964b33b776a93587635dfbe743045ad49ea6cca3
                                                  • Instruction Fuzzy Hash: A4E11774E042598FDB14DFA9C590AAEFBF2BF89304F24816AD514AB355D730AD42CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6bbab83fdbc5fbec7900be601d953f501cf1f817fb3e8f284f8b8dd771cc0206
                                                  • Instruction ID: 45e1e5dc00c1d7ebcb0b9922f094ac543f145864b3c23e889628cb7b9e4eb461
                                                  • Opcode Fuzzy Hash: 6bbab83fdbc5fbec7900be601d953f501cf1f817fb3e8f284f8b8dd771cc0206
                                                  • Instruction Fuzzy Hash: C0E11874E042598FDB14DFA8C590AAEFBF2BF89304F25816AD554AB355C730AD41CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3675143831.0000000008E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 08E80000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_8e80000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7bee5015d2fa54a8b9b0980c5c91fd950e74b50e9e1b8413b3d73af873ccaf43
                                                  • Instruction ID: 1b0835e715e5b18edad3cfc92e0c5ad09d7fa141f9d632b2c7d0f5883ae4c206
                                                  • Opcode Fuzzy Hash: 7bee5015d2fa54a8b9b0980c5c91fd950e74b50e9e1b8413b3d73af873ccaf43
                                                  • Instruction Fuzzy Hash: EAB18E71E00A09CFDB24DFA8C88579DBBF2BF48319F149529D81DAB294EB749845CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3665084494.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_14e0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d056ca79fe4e3bcbae564b2780148213986bb4c665f4dfad3ece6866d5f8e4fa
                                                  • Instruction ID: fd2e79f7f54cd72ded2cdc34aece56d3ffeeb50e5ab0439c99494a7952934d19
                                                  • Opcode Fuzzy Hash: d056ca79fe4e3bcbae564b2780148213986bb4c665f4dfad3ece6866d5f8e4fa
                                                  • Instruction Fuzzy Hash: 82A18F32E10219CFCF05DFB5C48859EBBF2FF94301B15856AE905AB261DB71E95ACB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1db5f4270c4f00f5d27418e6f25f96cbc2cf392d6507ec9c88936b6130969094
                                                  • Instruction ID: 0d4714869a584a58f86404cd35f2bb8704e9d16935dac55fbd5f473bd069a29f
                                                  • Opcode Fuzzy Hash: 1db5f4270c4f00f5d27418e6f25f96cbc2cf392d6507ec9c88936b6130969094
                                                  • Instruction Fuzzy Hash: 7451F4B4E052199FCB04DFAAD9849EEFBF6BF89300F15C126D509A7355DB30A942CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7a17bb55102107ac8a143fc5b1378b38b1af4a40422f7f14add6b8c14d2651b7
                                                  • Instruction ID: d64769caf5ccd8db0ab8b2c0250dd94180281cad3548739e72138e45ad278306
                                                  • Opcode Fuzzy Hash: 7a17bb55102107ac8a143fc5b1378b38b1af4a40422f7f14add6b8c14d2651b7
                                                  • Instruction Fuzzy Hash: 5F511974E042198BDB14CFA9C5806EEFBF2FF89205F24816AD518AB355D7309D41CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af50e80d6471f59e40e026ec3751f6c84f55cdd17c5a6c54b54cbee9ab314ae1
                                                  • Instruction ID: 176e497372f7eedc0c7531c7397f5b8b838411d1b4c122be44647f3033725b50
                                                  • Opcode Fuzzy Hash: af50e80d6471f59e40e026ec3751f6c84f55cdd17c5a6c54b54cbee9ab314ae1
                                                  • Instruction Fuzzy Hash: DB512B70E002198FDB14CFA9C9906AEFBF2BF89304F24816AD518AB355D7319D42CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e84ea2e5be3f80babe763cb0671f656de5ac53df5389f08c9a5060f0a14d49ec
                                                  • Instruction ID: 9498964f1a3ac32f1fe1839c4c636ce206510348f41661b680318d55c2e958dc
                                                  • Opcode Fuzzy Hash: e84ea2e5be3f80babe763cb0671f656de5ac53df5389f08c9a5060f0a14d49ec
                                                  • Instruction Fuzzy Hash: 78510770E042198FDB14CFA9C5806AEFBF2BF89304F2481AAD518AB355D7319D42CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0573e72551758f0deca8285e4026a74e68f88c3cc3cfec08a556e1733d7993c6
                                                  • Instruction ID: c24fa4b5f9dbff63021e43a477d4e4925f8268f594ec30a8a53dfa563f14f1a3
                                                  • Opcode Fuzzy Hash: 0573e72551758f0deca8285e4026a74e68f88c3cc3cfec08a556e1733d7993c6
                                                  • Instruction Fuzzy Hash: EE510974E042198BDB15CFA9C980AAEFBF2FF89304F24816AD518AB355D7319D41CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3672463142.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5df0000_2AylrL13DwoqmCT.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0cdff9f5f1dea137147beb0ffb692cdf656b722f7a81c5f5b70e6fd9396f037e
                                                  • Instruction ID: 333339813a61511a379f3f179586406cb3a3dfd5466d00b639949d25f6ead636
                                                  • Opcode Fuzzy Hash: 0cdff9f5f1dea137147beb0ffb692cdf656b722f7a81c5f5b70e6fd9396f037e
                                                  • Instruction Fuzzy Hash: C04105B5E016089FDB08DFAAD9846EEFBF2FF88300F14C02AD449A7355DB3099428B50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:8%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:53
                                                  Total number of Limit Nodes:10
                                                  execution_graph 15378 2bdd728 DuplicateHandle 15379 2bdd7be 15378->15379 15380 2bd4668 15381 2bd467f 15380->15381 15382 2bd468b 15381->15382 15384 2bd4798 15381->15384 15385 2bd47bd 15384->15385 15389 2bd48a8 15385->15389 15393 2bd4898 15385->15393 15391 2bd48cf 15389->15391 15390 2bd49ac 15390->15390 15391->15390 15398 2bd4508 15391->15398 15394 2bd47c7 15393->15394 15396 2bd48a7 15393->15396 15394->15382 15395 2bd49ac 15395->15395 15396->15395 15397 2bd4508 CreateActCtxA 15396->15397 15397->15395 15399 2bd5938 CreateActCtxA 15398->15399 15401 2bd59fb 15399->15401 15402 2bdd4e0 15403 2bdd526 GetCurrentProcess 15402->15403 15405 2bdd578 GetCurrentThread 15403->15405 15406 2bdd571 15403->15406 15407 2bdd5ae 15405->15407 15408 2bdd5b5 GetCurrentProcess 15405->15408 15406->15405 15407->15408 15411 2bdd5eb 15408->15411 15409 2bdd613 GetCurrentThreadId 15410 2bdd644 15409->15410 15411->15409 15412 2bdad50 15413 2bdad5f 15412->15413 15416 2bdae48 15412->15416 15424 2bdae37 15412->15424 15417 2bdae59 15416->15417 15418 2bdae7c 15416->15418 15417->15418 15432 2bdb0e0 15417->15432 15436 2bdb0d3 15417->15436 15418->15413 15419 2bdae74 15419->15418 15420 2bdb080 GetModuleHandleW 15419->15420 15421 2bdb0ad 15420->15421 15421->15413 15425 2bdae59 15424->15425 15426 2bdae7c 15424->15426 15425->15426 15430 2bdb0e0 LoadLibraryExW 15425->15430 15431 2bdb0d3 LoadLibraryExW 15425->15431 15426->15413 15427 2bdae74 15427->15426 15428 2bdb080 GetModuleHandleW 15427->15428 15429 2bdb0ad 15428->15429 15429->15413 15430->15427 15431->15427 15433 2bdb0f4 15432->15433 15435 2bdb119 15433->15435 15440 2bda228 15433->15440 15435->15419 15438 2bdb0e0 15436->15438 15437 2bdb119 15437->15419 15438->15437 15439 2bda228 LoadLibraryExW 15438->15439 15439->15437 15441 2bdb6c0 LoadLibraryExW 15440->15441 15443 2bdb739 15441->15443 15443->15435

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 294 2bdd4d0-2bdd56f GetCurrentProcess 298 2bdd578-2bdd5ac GetCurrentThread 294->298 299 2bdd571-2bdd577 294->299 300 2bdd5ae-2bdd5b4 298->300 301 2bdd5b5-2bdd5e9 GetCurrentProcess 298->301 299->298 300->301 303 2bdd5eb-2bdd5f1 301->303 304 2bdd5f2-2bdd60d call 2bdd6b0 301->304 303->304 307 2bdd613-2bdd642 GetCurrentThreadId 304->307 308 2bdd64b-2bdd6ad 307->308 309 2bdd644-2bdd64a 307->309 309->308
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 02BDD55E
                                                  • GetCurrentThread.KERNEL32 ref: 02BDD59B
                                                  • GetCurrentProcess.KERNEL32 ref: 02BDD5D8
                                                  • GetCurrentThreadId.KERNEL32 ref: 02BDD631
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: bd76f1fa8446d9219ba60d1e747bcc6fd41805558c220d2db38435db41ed8133
                                                  • Instruction ID: 73f03deeb0c8884bb1e82630e61d51d3763b8939cbe15b339005efab86e629f7
                                                  • Opcode Fuzzy Hash: bd76f1fa8446d9219ba60d1e747bcc6fd41805558c220d2db38435db41ed8133
                                                  • Instruction Fuzzy Hash: 395152B190034ACFDB14DFAAD548BDEBBF1AF48308F248499D009A7361DB346845CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 316 2bdd4e0-2bdd56f GetCurrentProcess 320 2bdd578-2bdd5ac GetCurrentThread 316->320 321 2bdd571-2bdd577 316->321 322 2bdd5ae-2bdd5b4 320->322 323 2bdd5b5-2bdd5e9 GetCurrentProcess 320->323 321->320 322->323 325 2bdd5eb-2bdd5f1 323->325 326 2bdd5f2-2bdd60d call 2bdd6b0 323->326 325->326 329 2bdd613-2bdd642 GetCurrentThreadId 326->329 330 2bdd64b-2bdd6ad 329->330 331 2bdd644-2bdd64a 329->331 331->330
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 02BDD55E
                                                  • GetCurrentThread.KERNEL32 ref: 02BDD59B
                                                  • GetCurrentProcess.KERNEL32 ref: 02BDD5D8
                                                  • GetCurrentThreadId.KERNEL32 ref: 02BDD631
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: f85c5ae5a3c99b96e2abb6b0d541def07cfd366e71825916a002cbe5995a1ae1
                                                  • Instruction ID: c090c605789dfa2c844cf42ad565e2252d3fbf1cab05978ec90dcaca4e75dcb3
                                                  • Opcode Fuzzy Hash: f85c5ae5a3c99b96e2abb6b0d541def07cfd366e71825916a002cbe5995a1ae1
                                                  • Instruction Fuzzy Hash: 1D5143B190024ACFDB14DFAAD548BDEBBF1EF88308F208499E419A7351DB34A944CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 360 2bdae48-2bdae57 361 2bdae59-2bdae66 call 2bda1c0 360->361 362 2bdae83-2bdae87 360->362 369 2bdae7c 361->369 370 2bdae68 361->370 363 2bdae89-2bdae93 362->363 364 2bdae9b-2bdaedc 362->364 363->364 371 2bdaede-2bdaee6 364->371 372 2bdaee9-2bdaef7 364->372 369->362 415 2bdae6e call 2bdb0e0 370->415 416 2bdae6e call 2bdb0d3 370->416 371->372 373 2bdaef9-2bdaefe 372->373 374 2bdaf1b-2bdaf1d 372->374 378 2bdaf09 373->378 379 2bdaf00-2bdaf07 call 2bda1cc 373->379 377 2bdaf20-2bdaf27 374->377 375 2bdae74-2bdae76 375->369 376 2bdafb8-2bdb078 375->376 410 2bdb07a-2bdb07d 376->410 411 2bdb080-2bdb0ab GetModuleHandleW 376->411 380 2bdaf29-2bdaf31 377->380 381 2bdaf34-2bdaf3b 377->381 382 2bdaf0b-2bdaf19 378->382 379->382 380->381 384 2bdaf3d-2bdaf45 381->384 385 2bdaf48-2bdaf51 call 2bda1dc 381->385 382->377 384->385 391 2bdaf5e-2bdaf63 385->391 392 2bdaf53-2bdaf5b 385->392 394 2bdaf65-2bdaf6c 391->394 395 2bdaf81-2bdaf8e 391->395 392->391 394->395 396 2bdaf6e-2bdaf7e call 2bda1ec call 2bda1fc 394->396 400 2bdafb1-2bdafb7 395->400 401 2bdaf90-2bdafae 395->401 396->395 401->400 410->411 412 2bdb0ad-2bdb0b3 411->412 413 2bdb0b4-2bdb0c8 411->413 412->413 415->375 416->375
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02BDB09E
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 0bad041100c399486e593798278ee3f2d94fc4755f730ee7d4ed50c0c88b88e7
                                                  • Instruction ID: 534a3159c3f1387921d97bd6cf39e05036989ea7a6402849d269a499b5aec2e1
                                                  • Opcode Fuzzy Hash: 0bad041100c399486e593798278ee3f2d94fc4755f730ee7d4ed50c0c88b88e7
                                                  • Instruction Fuzzy Hash: 977144B1A00B058FD728DF2AD45479ABBF1FF88304F00896DD49AD7A50E735E945CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 417 2bd4508-2bd59f9 CreateActCtxA 420 2bd59fb-2bd5a01 417->420 421 2bd5a02-2bd5a5c 417->421 420->421 428 2bd5a5e-2bd5a61 421->428 429 2bd5a6b-2bd5a6f 421->429 428->429 430 2bd5a71-2bd5a7d 429->430 431 2bd5a80-2bd5ab0 429->431 430->431 435 2bd5a62-2bd5a64 431->435 436 2bd5ab2-2bd5b34 431->436 435->429
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 02BD59E9
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 47ca6c73a0f47c476d6b37aad5fda92be74550ca5a132c71067f03a29ae2fcf1
                                                  • Instruction ID: 7aa95cd06725240fdab4fb7481af4f52628a89dd87233fe67d9432c1b2d07b39
                                                  • Opcode Fuzzy Hash: 47ca6c73a0f47c476d6b37aad5fda92be74550ca5a132c71067f03a29ae2fcf1
                                                  • Instruction Fuzzy Hash: 0241D371C00729CBEB25DFA9C844BCDBBB5BF48304F60816AD419AB251DB75694ACF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 438 2bd592d-2bd5936 439 2bd5938-2bd59f9 CreateActCtxA 438->439 441 2bd59fb-2bd5a01 439->441 442 2bd5a02-2bd5a5c 439->442 441->442 449 2bd5a5e-2bd5a61 442->449 450 2bd5a6b-2bd5a6f 442->450 449->450 451 2bd5a71-2bd5a7d 450->451 452 2bd5a80-2bd5ab0 450->452 451->452 456 2bd5a62-2bd5a64 452->456 457 2bd5ab2-2bd5b34 452->457 456->450
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 02BD59E9
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 8d1e6cb3cb7e45b881c0de82709abb326ff71b095ba23cb62ba9f1d23318d422
                                                  • Instruction ID: 3ac8220c66056793d036236ea6e3b6abc562d32d79da3a75b6f8b8919e4b4f56
                                                  • Opcode Fuzzy Hash: 8d1e6cb3cb7e45b881c0de82709abb326ff71b095ba23cb62ba9f1d23318d422
                                                  • Instruction Fuzzy Hash: 9A41E271C00769CBEB24DFA9C884BCDFBB1BF49304F2081AAD419AB250DB75694ACF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 459 2bdd720-2bdd7bc DuplicateHandle 460 2bdd7be-2bdd7c4 459->460 461 2bdd7c5-2bdd7e2 459->461 460->461
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BDD7AF
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: f02de489148a443eb02edd007ed9002697aebc5b4303deb0350c3332f4a2ee8e
                                                  • Instruction ID: 67737af1fed9f523d0cdc53457824eb5e38b5876b158c8334beb274d067508ec
                                                  • Opcode Fuzzy Hash: f02de489148a443eb02edd007ed9002697aebc5b4303deb0350c3332f4a2ee8e
                                                  • Instruction Fuzzy Hash: 1B21E3B6D002099FDB10CF9AD985BDEBBF5FB08310F14845AE954A7250D378A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 464 2bdd728-2bdd7bc DuplicateHandle 465 2bdd7be-2bdd7c4 464->465 466 2bdd7c5-2bdd7e2 464->466 465->466
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BDD7AF
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: e3e41c8857958a909e6099dc601e878eb8c6692f578b98d324d3357f6fca6b34
                                                  • Instruction ID: d078b0c94ff8a266f3271ce4920a96e9e979314e862c6f38d032905e6ceef7e3
                                                  • Opcode Fuzzy Hash: e3e41c8857958a909e6099dc601e878eb8c6692f578b98d324d3357f6fca6b34
                                                  • Instruction Fuzzy Hash: 8C21E4B5D002099FDB10CF9AD985ADEBBF5FB48310F14845AE954A3350D375A940CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 469 2bda228-2bdb700 471 2bdb708-2bdb737 LoadLibraryExW 469->471 472 2bdb702-2bdb705 469->472 473 2bdb739-2bdb73f 471->473 474 2bdb740-2bdb75d 471->474 472->471 473->474
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02BDB119,00000800,00000000,00000000), ref: 02BDB72A
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 06da7deb2ee27ba98e463f24c4ba17ab3bc321bbb4f2ad1d69dd1e39cdf60c9d
                                                  • Instruction ID: 6e897aa0dde96cc2cc82cd70d7406c64e3ef2a0e72b2659b75b4d02a7840aa70
                                                  • Opcode Fuzzy Hash: 06da7deb2ee27ba98e463f24c4ba17ab3bc321bbb4f2ad1d69dd1e39cdf60c9d
                                                  • Instruction Fuzzy Hash: 9A1122B6D002098BCB20CF9AC444BDEFBF4EB48314F10846EE819A7200C375A905CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 477 2bdb6bb-2bdb700 478 2bdb708-2bdb737 LoadLibraryExW 477->478 479 2bdb702-2bdb705 477->479 480 2bdb739-2bdb73f 478->480 481 2bdb740-2bdb75d 478->481 479->478 480->481
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02BDB119,00000800,00000000,00000000), ref: 02BDB72A
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 365e3eb2e47222c0e243a4e339b38d1be882764eb2a1606c439d01e1db8ae5f2
                                                  • Instruction ID: 9e0daed0fd340485d97bbe89404d586c40b95f89eb6e25c531b595c7e398315c
                                                  • Opcode Fuzzy Hash: 365e3eb2e47222c0e243a4e339b38d1be882764eb2a1606c439d01e1db8ae5f2
                                                  • Instruction Fuzzy Hash: 491142B6C003098FDB20CFAAC484BDEFBF4EB48314F10846AD818A7200C374A545CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 484 2bdb038-2bdb078 485 2bdb07a-2bdb07d 484->485 486 2bdb080-2bdb0ab GetModuleHandleW 484->486 485->486 487 2bdb0ad-2bdb0b3 486->487 488 2bdb0b4-2bdb0c8 486->488 487->488
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02BDB09E
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251559937.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_2bd0000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 0a67981c0d76178178258b15a1a34fea678600986d1d5412216b5bb7122a31d2
                                                  • Instruction ID: 7b2626291fa6b7ddb1c59dfc5f0eb54951f2934e7cdc0986ff82d0bf4f642893
                                                  • Opcode Fuzzy Hash: 0a67981c0d76178178258b15a1a34fea678600986d1d5412216b5bb7122a31d2
                                                  • Instruction Fuzzy Hash: BB1102B6C002498FCB20DF9AC444BDEFBF5EB88314F11845AD828A7610D375A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251215396.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11ed000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc01cb472b6e0c5dea013a8621d6cb3c5572bdd2e3c1bead30f27259d667c4be
                                                  • Instruction ID: 11b28995d5c2b018f27cb60e442c4f070d673f7ff64452dce925ffaeb7304562
                                                  • Opcode Fuzzy Hash: fc01cb472b6e0c5dea013a8621d6cb3c5572bdd2e3c1bead30f27259d667c4be
                                                  • Instruction Fuzzy Hash: EE21D376504641DFDF19DFD4E9C8B26BBA5FB88320F24C5A9E9090B246C336D416CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251258651.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11fd000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 13794409a39e38d5a081b674387dec987c849dea83603539986696ae49684c8d
                                                  • Instruction ID: 7491c787da90909f6c42242d79ddcb8a9c79b2cf68bd7e4dc5ebed75206b259d
                                                  • Opcode Fuzzy Hash: 13794409a39e38d5a081b674387dec987c849dea83603539986696ae49684c8d
                                                  • Instruction Fuzzy Hash: C7212271604300DFDF19DF54E9C4B26BB61EB84314F20C6ADEA0A4B386C336D807CA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251258651.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11fd000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2f7a296ccc2161fb71be784f867b39864c46110953c7aee1e01cc223df27368d
                                                  • Instruction ID: 235df789ae218eb38418105323c4d190912505553ea39b1d7ba9c4d60edca704
                                                  • Opcode Fuzzy Hash: 2f7a296ccc2161fb71be784f867b39864c46110953c7aee1e01cc223df27368d
                                                  • Instruction Fuzzy Hash: 13210779604300DFDF19DF94E9C4B26BB65FB84324F20C56DEA494B256C336D446CAA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251258651.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11fd000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e97a630965075ff6fd2852d8d0032f8c24943a70e4eaf36e7529cf5c194c12e1
                                                  • Instruction ID: 8fdba49c0a5557d4b42ab9c2b201303bbd852304e64042943590de2d43968c35
                                                  • Opcode Fuzzy Hash: e97a630965075ff6fd2852d8d0032f8c24943a70e4eaf36e7529cf5c194c12e1
                                                  • Instruction Fuzzy Hash: B821AE755093808FCB07CF24D990B15BF71EB46214F28C5EED9498F6A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251215396.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11ed000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                                                  • Instruction ID: 693449163cf68a2eb364748041ecaad919082c29079bbcd0e554ca83650836af
                                                  • Opcode Fuzzy Hash: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                                                  • Instruction Fuzzy Hash: 8621CD76504640CFCF0ACF94D9C4B16BFA2FB84320F24C1A9DC090A256C33AD426CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251258651.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11fd000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction ID: dd30b6fd3983e5965601338168f49421bd9e6f4e628ee86a2786c56f03c41fae
                                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                  • Instruction Fuzzy Hash: EA11BE79504240DFCB06CF54D5C0B25BB61FB84324F24C6AED9494B296C33AD40ACB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251215396.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11ed000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2db7f629ff2b83775ce6c6661a9f069967b0cf83e8dba1fa5118b99e00492c5a
                                                  • Instruction ID: e46b2e525707b11e397458a3d4b5e297dbba55390aee4e8fc502b197d3969735
                                                  • Opcode Fuzzy Hash: 2db7f629ff2b83775ce6c6661a9f069967b0cf83e8dba1fa5118b99e00492c5a
                                                  • Instruction Fuzzy Hash: 8801F731944F809AFB285BD5DCC8B26BFD8DF41229F08C51AED190A282D3399841CBB3
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.1251215396.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_11ed000_KrzbVJsCi.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 63007f6b0ff16339bae0d4ccd25dd7b867cbdc345ca40ff0563499a78f25e7f0
                                                  • Instruction ID: 92cb12fd087324befba906d18b740ad56ce55f2415412910094eafdb0622bb68
                                                  • Opcode Fuzzy Hash: 63007f6b0ff16339bae0d4ccd25dd7b867cbdc345ca40ff0563499a78f25e7f0
                                                  • Instruction Fuzzy Hash: 02F0C2314447809EEB148F9ADC88B62FFE8EB41234F18C45AED080A286C3799840CBB2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%