Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Disable_automatic_email_errors.exe

Overview

General Information

Sample Name:Disable_automatic_email_errors.exe
Analysis ID:1285130
MD5:971d710c2612f65b6dc5facb2ba5aac3
SHA1:5a84e0d34ac1b8f41435ff09056915fa347be640
SHA256:08552fc7c1fcdb754d81dad78184ad191d0585b970a1b633cef88ce63804947e
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
May check the online IP address of the machine
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • ggh.exe (PID: 6624 cmdline: "C:\Users\user\AppData\Roaming\ggh\ggh.exe" MD5: 971D710C2612F65B6DC5FACB2BA5AAC3)
  • ggh.exe (PID: 760 cmdline: "C:\Users\user\AppData\Roaming\ggh\ggh.exe" MD5: 971D710C2612F65B6DC5FACB2BA5AAC3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.grabinphone.com", "Username": "noreply2@grabinphone.com", "Password": "bGOD8rATGOD3sZGOD"}
SourceRuleDescriptionAuthorStrings
Disable_automatic_email_errors.exeJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\ggh\ggh.exeJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.649418383.0000000002700000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.649418383.0000000002700000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.649230805.0000000002970000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000004.00000002.649230805.0000000002970000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000003.385931542.0000000005F97000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                Click to see the 10 entries
                SourceRuleDescriptionAuthorStrings
                0.0.Disable_automatic_email_errors.exe.290000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.grabinphone.com", "Username": "noreply2@grabinphone.com", "Password": "bGOD8rATGOD3sZGOD"}
                  Source: Disable_automatic_email_errors.exeReversingLabs: Detection: 60%
                  Source: Disable_automatic_email_errors.exeVirustotal: Detection: 57%Perma Link
                  Source: Disable_automatic_email_errors.exeAvira: detected
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeAvira: detection malicious, Label: TR/Spy.Gen8
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeReversingLabs: Detection: 60%
                  Source: Disable_automatic_email_errors.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeJoe Sandbox ML: detected
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: /log.tmp
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>[
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ]<br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: .txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: text/plain
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Time:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>User Name:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>Computer Name:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>OSFullName:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>CPU:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>RAM:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IP Address:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <hr>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: New
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IP Address:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: https://api.ipify.org
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: false
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: false
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: false
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: mail.grabinphone.com
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: noreply2@grabinphone.com
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: bGOD8rATGOD3sZGOD
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: noreply2@grabinphone.com
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: false
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: appdata
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ggh.exe
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: true
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Type
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 2023-07-30
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: yyyy-MM-dd
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Microsoft\Windows\CurrentVersion\Run
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Microsoft\Windows\CurrentVersion\Run
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <hr>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <b>[
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ]</b> (
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: )<br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {BACK}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {ALT+TAB}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {ALT+F4}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {TAB}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {ESC}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {Win}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {CAPSLOCK}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {KEYUP}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {KEYDOWN}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {KEYLEFT}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {KEYRIGHT}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {DEL}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {END}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {HOME}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {Insert}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {NumLock}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {PageDown}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {PageUp}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {ENTER}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F1}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F2}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F3}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F4}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F5}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F6}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F7}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F8}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F9}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F10}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F11}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {F12}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: control
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {CTRL}
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: &amp;
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: &lt;
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: &gt;
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: &quot;
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <br><hr>Copied Text: <br>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <hr>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: logins
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IE/Edge
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Secure Note
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Web Password Credential
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Credential Picker Protector
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Web Credentials
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Credentials
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Domain Certificate Credential
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Domain Password Credential
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Extended Credential
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SchemaId
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pResourceElement
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pIdentityElement
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pPackageSid
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pAuthenticatorElement
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IE/Edge
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UC Browser
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UCBrowser\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Login Data
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: journal
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: wow_logins
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Safari for Windows
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <array>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <dict>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <string>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </string>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <string>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </string>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <data>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </data>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: -convert xml1 -s -o "
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \fixed_keychain.xml"
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Microsoft\Protect\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: credential
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: QQ Browser
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Tencent\QQBrowser\User Data
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Default\EncryptedStorage
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Profile
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \EncryptedStorage
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: entries
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: category
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: str3
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: str2
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: blob0
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: password_value
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IncrediMail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PopPassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SmtpPassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\IncrediMail\Identities\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Accounts_New
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PopPassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SmtpPassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SmtpServer
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: EmailAddress
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Eudora
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: current
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Settings
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SavePasswordText
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Settings
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ReturnAddress
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Falkon Browser
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \falkon\profiles\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: profiles.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: profiles.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \browsedata.db
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: autofill
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ClawsMail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Claws-mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \clawsrc
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \clawsrc
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passkey0
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: master_passphrase_salt=(.+)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \accountrc
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: smtp_server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: address
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: account
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \passwordstorerc
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: {(.*),(.*)}(.*)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Flock Browser
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: APPDATA
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Flock\Browser\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: signons3.txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: DynDns
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ALLUSERSPROFILE
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Dyn\Updater\config.dyndns
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: username=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: password=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: https://account.dyn.com/
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: t6KzXhCh
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ALLUSERSPROFILE
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Dyn\Updater\daemon.cfg
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: global
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: accounts
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: account.
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: username
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: account.
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Psi/Psi+
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: name
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Psi/Psi+
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: APPDATA
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Psi\profiles
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: APPDATA
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Psi+\profiles
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \accounts.xml
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \accounts.xml
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: OpenVPN
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\OpenVPN-GUI\configs
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\OpenVPN-GUI\configs
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\OpenVPN-GUI\configs\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: username
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: auth-data
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: entropy
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: USERPROFILE
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \OpenVPN\config\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: remote
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: remote
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: NordVPN
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: NordVPN
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: NordVpn.exe*
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: user.config
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: //setting[@name='Username']/value
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: //setting[@name='Password']/value
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: NordVPN
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Private Internet Access
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: %ProgramW6432%
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Private Internet Access\data
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Private Internet Access\data
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \account.json
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: .*"username":"(.*?)"
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: .*"password":"(.*?)"
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Private Internet Access
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: privateinternetaccess.com
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: FileZilla
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: APPDATA
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \FileZilla\recentservers.xml
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: APPDATA
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \FileZilla\recentservers.xml
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Server>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Host>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Host>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </Host>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Port>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </Port>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <User>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <User>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </User>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Pass encoding="base64">
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Pass encoding="base64">
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </Pass>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Pass>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <Pass encoding="base64">
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </Pass>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: CoreFTP
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: User
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Host
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Port
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: hdfzpysvpzimorhk
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: WinSCP
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: HostName
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UserName
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PublicKeyFile
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PortNumber
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: WinSCP
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ABCDEF
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Flash FXP
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: port
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: user
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pass
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: quick.dat
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Sites.dat
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \FlashFXP\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \FlashFXP\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: FTP Navigator
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SystemDrive
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \FTP Navigator\Ftplist.txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: No Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: User
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SmartFTP
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: APPDATA
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: WS_FTP
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: appdata
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: HOST
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PWD=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PWD=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: FtpCommander
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SystemDrive
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SystemDrive
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SystemDrive
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \cftp\Ftplist.txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;Password=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;User=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;Server=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;Port=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;Port=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;Password=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;User=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ;Anonymous=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: FTPGetter
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \FTPGetter\servers.xml
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server_ip>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server_ip>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </server_ip>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server_port>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </server_port>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server_user_name>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server_user_name>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </server_user_name>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server_user_password>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: <server_user_password>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: </server_user_password>
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: FTPGetter
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: The Bat!
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: appdata
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \The Bat!
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Account.CFN
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Account.CFN
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Becky!
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: DataDir
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Folder.lst
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Mailbox.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Account
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PassWd
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Account
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SMTPServer
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Account
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: MailAddress
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Becky!
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Outlook
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Email
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IMAP Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: POP3 Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: HTTP Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SMTP Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Email
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Email
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Email
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IMAP Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: POP3 Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: HTTP Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SMTP Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Windows Mail App
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Email
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SchemaId
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pResourceElement
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pIdentityElement
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pPackageSid
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: pAuthenticatorElement
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: syncpassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: mailoutgoing
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: FoxMail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Executable
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: FoxmailPath
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Storage\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Storage\
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Accounts\Account.rec0
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Accounts\Account.rec0
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Account.stg
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Account.stg
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: POP3Host
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SMTPHost
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: IncomingServer
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Account
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: MailAddress
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: POP3Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Opera Mail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: opera:
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PocoMail
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: appdata
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Pocomail\accounts.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Email
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: POPPass
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SMTPPass
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SMTP
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: eM Client
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: eM Client\accounts.dat
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: eM Client
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Accounts
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: "Username":"
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: "Secret":"
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: "ProviderName":"
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: o6806642kbM7c5
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Mailbird
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SenderIdentities
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Accounts
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \Mailbird\Store\Store.db
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Server_Host
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Accounts
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Email
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Username
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: EncryptedPassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Mailbird
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: RealVNC 4.x
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: RealVNC 3.x
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: RealVNC 4.x
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: RealVNC 3.x
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\ORL\WinVNC3
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: TightVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\TightVNC\Server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: TightVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\TightVNC\Server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: PasswordViewOnly
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: TightVNC ControlPassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\TightVNC\Server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ControlPassword
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: TigerVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Software\TigerVNC\Server
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: Password
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd2
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd2
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd2
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: UltraVNC
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: passwd2
                  Source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpackString decryptor: JDownloader 2.0
                  Source: Disable_automatic_email_errors.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.2.5:49717 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49720 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49722 version: TLS 1.2
                  Source: Disable_automatic_email_errors.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeDNS query: name: api.ipify.org
                  Source: Joe Sandbox ViewASN Name: NETONBOARD-MYNetOnboardSdnBhd-QualityReliableCloud NETONBOARD-MYNetOnboardSdnBhd-QualityReliableCloud
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Joe Sandbox ViewIP Address: 64.185.227.156 64.185.227.156
                  Source: Joe Sandbox ViewIP Address: 64.185.227.156 64.185.227.156
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficTCP traffic: 192.168.2.5:49718 -> 103.211.239.66:587
                  Source: global trafficTCP traffic: 192.168.2.5:49718 -> 103.211.239.66:587
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.659647994.0000000005FA8000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FCE000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.0000000000945000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538076671.0000000005FB2000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.0000000000960000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000C24000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CD6000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: Disable_automatic_email_errors.exe, 00000000.00000003.538201206.0000000000945000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.433183496.0000000006A70000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000C24000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.659907754.0000000006390000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.659647994.0000000005FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.cCN
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.000000000096B000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FBF000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.0000000000945000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538076671.0000000005FB2000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000C24000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CA6000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.659647994.0000000005FA8000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FC6000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.0000000000951000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538076671.0000000005FB2000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000C24000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.659907754.0000000006390000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CD6000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                  Source: Disable_automatic_email_errors.exe, 00000000.00000003.389381234.0000000000999000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.428721241.0000000001634000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000001.00000003.423297827.0000000001625000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000003.436792918.0000000000C9A000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: ggh.exe, 00000001.00000002.433183496.0000000006A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FBF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.comod
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.429886562.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.grabinphone.com
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.659647994.0000000005FA8000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FCE000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FC6000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.0000000000951000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.000000000096B000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FBF000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.0000000000945000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538076671.0000000005FB2000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.0000000000960000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.00000000009AA000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000C24000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.659907754.0000000006390000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CD6000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CA6000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.429886562.0000000003231000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.000000000292C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.429886562.0000000003231000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.000000000292C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.429886562.0000000003231000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.000000000292C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.659647994.0000000005FA8000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FC6000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.0000000000951000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538076671.0000000005FB2000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000C24000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.659907754.0000000006390000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CD6000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: unknownDNS traffic detected: queries for: api.ipify.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.2.5:49717 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49720 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49722 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Disable_automatic_email_errors.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\ggh\ggh.exeJump to behavior
                  Source: Disable_automatic_email_errors.exe, Y7ALd2ht.cs.Net Code: cpDC0rHNkG
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.648252195.00000000008CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: Disable_automatic_email_errors.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0249AA700_2_0249AA70
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0249CA300_2_0249CA30
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_02499E580_2_02499E58
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0249020D0_2_0249020D
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_024981440_2_02498144
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0249A1A00_2_0249A1A0
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053BF2D00_2_053BF2D0
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053BD9980_2_053BD998
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053B35580_2_053B3558
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053BA5F80_2_053BA5F8
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053B71C80_2_053B71C8
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053BD0680_2_053BD068
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053B3D700_2_053B3D70
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_053BC8E00_2_053BC8E0
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_060946B80_2_060946B8
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0609C7B80_2_0609C7B8
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_06096CB00_2_06096CB0
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_060932C00_2_060932C0
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0609D9310_2_0609D931
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0609D9600_2_0609D960
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_017BAA701_2_017BAA70
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_017BCA301_2_017BCA30
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_017B9E581_2_017B9E58
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_017B81441_2_017B8144
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_017BA1A01_2_017BA1A0
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CCA4D81_2_06CCA4D8
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CC45701_2_06CC4570
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CCF1B01_2_06CCF1B0
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CC73FE1_2_06CC73FE
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CCCF331_2_06CCCF33
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CCF8791_2_06CCF879
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CF303A1_2_06CF303A
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CF6A381_2_06CF6A38
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_06CC6C7F1_2_06CC6C7F
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_00F8AA704_2_00F8AA70
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_00F8CA304_2_00F8CA30
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_00F89E584_2_00F89E58
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_00F8A1A04_2_00F8A1A0
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064AC7C04_2_064AC7C0
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064AA4D84_2_064AA4D8
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064A45704_2_064A4570
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064A70624_2_064A7062
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064AF1B04_2_064AF1B0
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064ACF334_2_064ACF33
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DD6E04_2_064DD6E0
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064D44404_2_064D4440
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DC5384_2_064DC538
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064D303A4_2_064D303A
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DD63B4_2_064DD63B
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DD6304_2_064DD630
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DD5EF4_2_064DD5EF
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DD5F34_2_064DD5F3
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064D6A384_2_064D6A38
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064A6C7F4_2_064A6C7F
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.648252195.00000000008CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Disable_automatic_email_errors.exe
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.648022270.00000000006F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Disable_automatic_email_errors.exe
                  Source: Disable_automatic_email_errors.exe, 00000000.00000000.381688362.0000000000292000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamee54e8234-c538-4d61-9ae7-0c66fe2c76ab.exe4 vs Disable_automatic_email_errors.exe
                  Source: Disable_automatic_email_errors.exe, 00000000.00000003.385931542.0000000005F97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamee54e8234-c538-4d61-9ae7-0c66fe2c76ab.exe4 vs Disable_automatic_email_errors.exe
                  Source: Disable_automatic_email_errors.exeBinary or memory string: OriginalFilenamee54e8234-c538-4d61-9ae7-0c66fe2c76ab.exe4 vs Disable_automatic_email_errors.exe
                  Source: Disable_automatic_email_errors.exeReversingLabs: Detection: 60%
                  Source: Disable_automatic_email_errors.exeVirustotal: Detection: 57%
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile read: C:\Users\user\Desktop\Disable_automatic_email_errors.exeJump to behavior
                  Source: Disable_automatic_email_errors.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Disable_automatic_email_errors.exe C:\Users\user\Desktop\Disable_automatic_email_errors.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\ggh\ggh.exe "C:\Users\user\AppData\Roaming\ggh\ggh.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\ggh\ggh.exe "C:\Users\user\AppData\Roaming\ggh\ggh.exe"
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile created: C:\Users\user\AppData\Roaming\gghJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@11/3
                  Source: Disable_automatic_email_errors.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: Disable_automatic_email_errors.exe, Kmbq.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Disable_automatic_email_errors.exe, i3NieABBvPx.csCryptographic APIs: 'CreateDecryptor'
                  Source: Disable_automatic_email_errors.exe, mmBPv5px6TD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Disable_automatic_email_errors.exe, f1PesMmfD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Disable_automatic_email_errors.exe, 4BiOIibx7.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Disable_automatic_email_errors.exe, Zt080i.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: Disable_automatic_email_errors.exe, PkUuN2.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Disable_automatic_email_errors.exe, PkUuN2.csCryptographic APIs: 'TransformFinalBlock'
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Disable_automatic_email_errors.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Disable_automatic_email_errors.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_024922AD push esp; retf 0_2_024922AE
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 1_2_017B22AD push esp; retf 1_2_017B22AE
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_00F822AD push esp; retf 4_2_00F822AE
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064D87A0 push es; ret 4_2_064D87B0
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DBA00 pushad ; iretd 4_2_064DBA01
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeCode function: 4_2_064DBAAA pushfd ; iretd 4_2_064DBAAD
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile created: C:\Users\user\AppData\Roaming\ggh\ggh.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run gghJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run gghJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile opened: C:\Users\user\AppData\Roaming\ggh\ggh.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -200000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99859s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5572Thread sleep count: 9801 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99750s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99640s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99531s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99422s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99312s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99194s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99078s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98968s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98859s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98589s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98472s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98343s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98234s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98122s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98015s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97906s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97796s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97687s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97578s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97464s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97359s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97250s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99858s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99749s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99500s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99380s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99250s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99139s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -99022s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98906s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98797s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98688s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -98110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97938s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97828s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -97438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -180000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -179840s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exe TID: 5588Thread sleep time: -179717s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 5416Thread sleep count: 2984 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99875s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99766s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99657s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99391s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99281s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99171s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -99063s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -98907s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -98751s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -98610s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -98499s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -98391s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -98250s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7144Thread sleep time: -98054s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 7132Thread sleep count: 9860 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99860s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99750s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99638s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99531s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99422s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99313s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99188s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99047s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98937s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98828s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98719s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98609s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98390s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98281s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98172s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98061s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97953s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97844s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97734s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97609s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97391s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97250s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97141s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -97031s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -96922s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -96805s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -96686s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -96578s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -96469s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99873s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99766s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99641s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99529s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99406s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99297s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99187s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -99078s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98969s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98859s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98750s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98641s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98531s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98422s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98312s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98203s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe TID: 6776Thread sleep time: -98094s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_02498144 rdtsc 0_2_02498144
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 180000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWindow / User API: threadDelayed 9801Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWindow / User API: threadDelayed 2984Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWindow / User API: threadDelayed 9860Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99859Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99750Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99640Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99531Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99422Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99312Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99194Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99078Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98968Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98859Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98719Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98589Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98472Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98343Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98234Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98122Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98015Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97906Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97796Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97687Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97578Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97464Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97359Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97250Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99858Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99749Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99641Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99500Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99380Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99250Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99139Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 99022Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98906Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98797Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98688Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98547Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98438Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98328Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98219Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 98110Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97938Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97828Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97719Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97610Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 97438Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 180000Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 179840Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeThread delayed: delay time: 179717Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99766Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99657Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99500Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99391Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99281Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99171Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99063Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98907Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98751Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98610Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98499Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98391Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98250Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98054Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99860Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99750Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99638Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99531Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99422Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99313Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99188Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99047Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98937Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98828Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98719Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98609Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98500Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98390Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98281Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98172Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98061Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97953Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97844Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97734Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97609Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97500Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97391Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97250Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97141Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 97031Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 96922Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 96805Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 96686Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 96578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 96469Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99873Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99766Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99641Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99529Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99406Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99297Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99187Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 99078Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98969Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98859Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98750Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98641Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98531Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98422Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98312Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98203Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeThread delayed: delay time: 98094Jump to behavior
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.656076012.000000000377D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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
                  Source: ggh.exe, 00000004.00000003.436792918.0000000000C9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
                  Source: Disable_automatic_email_errors.exe, 00000000.00000003.389381234.0000000000983000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000001.00000003.423297827.000000000160F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_02498144 rdtsc 0_2_02498144
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q9<b>[ Program Manager]</b> (8/3/2023 6:46:25 PM)<br>{Win}r
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q3<b>[ Program Manager]</b> (8/3/2023 6:46:25 PM)<br>
                  Source: Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q8<b>[ Program Manager]</b> (8/3/2023 6:46:25 PM)<br>{Win}
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeQueries volume information: C:\Users\user\Desktop\Disable_automatic_email_errors.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Users\user\AppData\Roaming\ggh\ggh.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Users\user\AppData\Roaming\ggh\ggh.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeCode function: 0_2_0249F1DC GetUserNameW,0_2_0249F1DC

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.649418383.0000000002700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.649230805.0000000002970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.429886562.0000000003280000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Disable_automatic_email_errors.exe PID: 6428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ggh.exe PID: 6624, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ggh.exe PID: 760, type: MEMORYSTR
                  Source: Yara matchFile source: Disable_automatic_email_errors.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.385931542.0000000005F97000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.381688362.0000000000292000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\ggh\ggh.exe, type: DROPPED
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\Desktop\Disable_automatic_email_errors.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ggh\ggh.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: Yara matchFile source: 00000000.00000002.649418383.0000000002700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.649230805.0000000002970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.429886562.0000000003280000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Disable_automatic_email_errors.exe PID: 6428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ggh.exe PID: 6624, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ggh.exe PID: 760, type: MEMORYSTR
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.649418383.0000000002700000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.649230805.0000000002970000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.429886562.0000000003280000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Disable_automatic_email_errors.exe PID: 6428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ggh.exe PID: 6624, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ggh.exe PID: 760, type: MEMORYSTR
                  Source: Yara matchFile source: Disable_automatic_email_errors.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Disable_automatic_email_errors.exe.290000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.385931542.0000000005F97000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.381688362.0000000000292000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\ggh\ggh.exe, type: DROPPED
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts121
                  Windows Management Instrumentation
                  1
                  Registry Run Keys / Startup Folder
                  2
                  Process Injection
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  Account Discovery
                  Remote Services11
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Ingress Tool Transfer
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  Registry Run Keys / Startup Folder
                  1
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  24
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  Exfiltration Over Bluetooth11
                  Encrypted Channel
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  1
                  Query Registry
                  SMB/Windows Admin Shares1
                  Email Collection
                  Automated Exfiltration1
                  Non-Standard Port
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Masquerading
                  NTDS221
                  Security Software Discovery
                  Distributed Component Object Model211
                  Input Capture
                  Scheduled Transfer2
                  Non-Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
                  Virtualization/Sandbox Evasion
                  LSA Secrets2
                  Process Discovery
                  SSH1
                  Clipboard Data
                  Data Transfer Size Limits23
                  Application Layer Protocol
                  Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Process Injection
                  Cached Domain Credentials131
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Hidden Files and Directories
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                  System Owner/User Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                  Remote System Discovery
                  Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                  System Network Configuration Discovery
                  Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1285130 Sample: Disable_automatic_email_err... Startdate: 03/08/2023 Architecture: WINDOWS Score: 100 30 Found malware configuration 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 4 other signatures 2->36 5 Disable_automatic_email_errors.exe 17 5 2->5         started        10 ggh.exe 14 2 2->10         started        12 ggh.exe 2 2->12         started        process3 dnsIp4 18 mail.grabinphone.com 103.211.239.66, 49718, 49719, 49721 NETONBOARD-MYNetOnboardSdnBhd-QualityReliableCloud Malaysia 5->18 20 api4.ipify.org 173.231.16.76, 443, 49717 WEBNXUS United States 5->20 22 api.ipify.org 5->22 14 C:\Users\user\AppData\Roaming\ggh\ggh.exe, PE32 5->14 dropped 16 C:\Users\user\...\ggh.exe:Zone.Identifier, ASCII 5->16 dropped 38 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 5->38 40 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 5->40 42 May check the online IP address of the machine 5->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 5->44 24 64.185.227.156, 443, 49720, 49722 WEBNXUS United States 10->24 26 api.ipify.org 10->26 46 Antivirus detection for dropped file 10->46 48 Multi AV Scanner detection for dropped file 10->48 50 Tries to steal Mail credentials (via file / registry access) 10->50 52 Machine Learning detection for dropped file 10->52 28 api.ipify.org 12->28 54 Tries to harvest and steal browser information (history, passwords, etc) 12->54 56 Installs a global keyboard hook 12->56 file5 signatures6

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Disable_automatic_email_errors.exe61%ReversingLabsWin32.Trojan.Whispergate
                  Disable_automatic_email_errors.exe57%VirustotalBrowse
                  Disable_automatic_email_errors.exe100%AviraTR/Spy.Gen8
                  Disable_automatic_email_errors.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\ggh\ggh.exe100%AviraTR/Spy.Gen8
                  C:\Users\user\AppData\Roaming\ggh\ggh.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\ggh\ggh.exe61%ReversingLabsWin32.Trojan.Whispergate
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://sectigo.com/CPS00%URL Reputationsafe
                  http://crt.comod0%URL Reputationsafe
                  http://crl.micro0%URL Reputationsafe
                  http://mail.grabinphone.com0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api4.ipify.org
                  173.231.16.76
                  truefalse
                    high
                    mail.grabinphone.com
                    103.211.239.66
                    truetrue
                      unknown
                      api.ipify.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgDisable_automatic_email_errors.exe, 00000000.00000002.649418383.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.429886562.0000000003231000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.000000000292C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://sectigo.com/CPS0Disable_automatic_email_errors.exe, 00000000.00000002.659647994.0000000005FA8000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FC6000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.648588268.0000000000951000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538201206.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000003.538076671.0000000005FB2000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000C24000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.659907754.0000000006390000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.648288743.0000000000CD6000.00000004.00000020.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crt.comodDisable_automatic_email_errors.exe, 00000000.00000002.659852655.0000000005FBF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.microggh.exe, 00000001.00000002.433183496.0000000006A70000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://mail.grabinphone.comDisable_automatic_email_errors.exe, 00000000.00000002.649418383.000000000280D000.00000004.00000800.00020000.00000000.sdmp, Disable_automatic_email_errors.exe, 00000000.00000002.649418383.0000000002731000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.429886562.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.0000000002A7D000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDisable_automatic_email_errors.exe, 00000000.00000002.649418383.00000000026B1000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000001.00000002.429886562.0000000003231000.00000004.00000800.00020000.00000000.sdmp, ggh.exe, 00000004.00000002.649230805.000000000292C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              103.211.239.66
                              mail.grabinphone.comMalaysia
                              45144NETONBOARD-MYNetOnboardSdnBhd-QualityReliableCloudtrue
                              64.185.227.156
                              unknownUnited States
                              18450WEBNXUSfalse
                              173.231.16.76
                              api4.ipify.orgUnited States
                              18450WEBNXUSfalse
                              Joe Sandbox Version:38.0.0 Beryl
                              Analysis ID:1285130
                              Start date and time:2023-08-03 15:53:06 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 15m 8s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample file name:Disable_automatic_email_errors.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/2@11/3
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 155
                              • Number of non-executed functions: 11
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              15:54:03API Interceptor963x Sleep call for process: Disable_automatic_email_errors.exe modified
                              15:54:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ggh C:\Users\user\AppData\Roaming\ggh\ggh.exe
                              15:54:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ggh C:\Users\user\AppData\Roaming\ggh\ggh.exe
                              15:54:19API Interceptor803x Sleep call for process: ggh.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              103.211.239.66Amended_Po-1423300134.exeGet hashmaliciousUnknownBrowse
                                64.185.227.1561.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                • api.ipify.org/
                                rQIV7B0ua7.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                • api.ipify.org/?format=qwd
                                31d722331a9890b3ac394bf19fa6246397fbf79b37f23.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                • api.ipify.org/?format=txt
                                PIB42H30FM.exeGet hashmaliciousNeshta, Targeted RansomwareBrowse
                                • api.ipify.org/
                                dCiZg2JJEr.exeGet hashmaliciousTargeted RansomwareBrowse
                                • api.ipify.org/
                                4SZhefNRtQ.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                • api.ipify.org/?format=txt
                                mTCDNn2yjZ.exeGet hashmaliciousTargeted RansomwareBrowse
                                • api.ipify.org/
                                img014012022.exeGet hashmaliciousMassLogger RATBrowse
                                • api.ipify.org/
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                api4.ipify.orgChromeSetup.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                SecuriteInfo.com.Trojan.PackedNET.2235.1062.27589.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SecuriteInfo.com.Win32.KeyloggerX-gen.22638.32322.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                Microsoft_Teams_SC.ba#.batGet hashmaliciousUnknownBrowse
                                • 173.231.16.76
                                SecuriteInfo.com.Trojan.Olock.1.6641.10915.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                Hc9QZCcNQx.exeGet hashmaliciousGuLoader, SmokeLoaderBrowse
                                • 173.231.16.76
                                nE6APl1dxH.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                Rkei13h0CV.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                Booking071305pdf.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                all_invoice0876.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                Updated_SOA.docx.docGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SHIPPMENT.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                Order_#_CCI-12623-28830.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                US_$_295,500.00.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                PENDING_NEW_ORDER__097KH89.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SecuriteInfo.com.Win32.PWSX-gen.27086.7282.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                SecuriteInfo.com.Win32.PWSX-gen.17904.14064.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                s1dL3d8yiL.exeGet hashmaliciousAgentTesla, GuLoader, SmokeLoaderBrowse
                                • 104.237.62.211
                                SecuriteInfo.com.Trojan.Olock.1.32408.29910.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SecuriteInfo.com.MSIL.GenericKDS.61009645.tr.1321.15127.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                WEBNXUSChromeSetup.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SecuriteInfo.com.Trojan.PackedNET.2235.1062.27589.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SecuriteInfo.com.Win32.KeyloggerX-gen.22638.32322.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                Microsoft_Teams_SC.ba#.batGet hashmaliciousUnknownBrowse
                                • 173.231.16.76
                                SecuriteInfo.com.Trojan.Olock.1.6641.10915.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                Hc9QZCcNQx.exeGet hashmaliciousGuLoader, SmokeLoaderBrowse
                                • 173.231.16.76
                                nE6APl1dxH.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                Rkei13h0CV.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                Booking071305pdf.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                all_invoice0876.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                Updated_SOA.docx.docGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SHIPPMENT.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                Order_#_CCI-12623-28830.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                US_$_295,500.00.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                PENDING_NEW_ORDER__097KH89.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SecuriteInfo.com.Win32.PWSX-gen.27086.7282.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                SecuriteInfo.com.Win32.PWSX-gen.17904.14064.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.237.62.211
                                s1dL3d8yiL.exeGet hashmaliciousAgentTesla, GuLoader, SmokeLoaderBrowse
                                • 104.237.62.211
                                SecuriteInfo.com.Trojan.Olock.1.32408.29910.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                SecuriteInfo.com.MSIL.GenericKDS.61009645.tr.1321.15127.exeGet hashmaliciousAgentTeslaBrowse
                                • 173.231.16.76
                                NETONBOARD-MYNetOnboardSdnBhd-QualityReliableCloudAmended_Po-1423300134.exeGet hashmaliciousUnknownBrowse
                                • 103.211.239.66
                                PO-21004-1-Ind Expert.docGet hashmaliciousUnknownBrowse
                                • 43.252.37.193
                                PAYMENT DETAILS .docGet hashmaliciousUnknownBrowse
                                • 43.252.37.193
                                Revised Purchase Order 1214.docGet hashmaliciousAgentTeslaBrowse
                                • 43.252.37.193
                                INQUIRY_RFQ_20210208.docGet hashmaliciousAgentTeslaBrowse
                                • 43.252.37.193
                                Request- NAVALTECH.docGet hashmaliciousAgentTeslaBrowse
                                • 43.252.37.193
                                Quotation-20441.docGet hashmaliciousAgentTeslaBrowse
                                • 43.252.37.193
                                PROFORMA INVOICE-09765434.docGet hashmaliciousAgentTeslaBrowse
                                • 43.252.37.193
                                New ORDER 092134..docGet hashmaliciousAgentTeslaBrowse
                                • 43.252.37.193
                                RFQ A50924-E001.docGet hashmaliciousUnknownBrowse
                                • 43.252.37.193
                                quotation085312456.docGet hashmaliciousUnknownBrowse
                                • 43.252.37.193
                                STEELWORKS RFQ-38166.docGet hashmaliciousAgentTeslaBrowse
                                • 43.252.37.193
                                PAYMENT 25SW Aug-06-2018.docGet hashmaliciousBrowse
                                • 182.239.42.250
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0eChromeSetup.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                SourceTreeSetup-3.4.14.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                S3RTqIfDZ4.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                SourceTreeSetup-3.4.14.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                SecuriteInfo.com.Trojan.PackedNET.2235.1062.27589.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                SecuriteInfo.com.Win32.KeyloggerX-gen.22638.32322.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                SecuriteInfo.com.Trojan.Olock.1.6641.10915.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                Hc9QZCcNQx.exeGet hashmaliciousGuLoader, SmokeLoaderBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                nE6APl1dxH.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                Rkei13h0CV.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                service-supporterx.htaGet hashmaliciousNetSupport RATBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                download.ps1Get hashmaliciousUnknownBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                Booking071305pdf.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                all_invoice0876.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                Refbkefruvt.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                csAWlpkhD1.exeGet hashmaliciousSystemBCBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                #U00d6deme_31722.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                SHIPPMENT.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                Order_#_CCI-12623-28830.exeGet hashmaliciousAgentTeslaBrowse
                                • 64.185.227.156
                                • 173.231.16.76
                                No context
                                Process:C:\Users\user\Desktop\Disable_automatic_email_errors.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):252928
                                Entropy (8bit):5.3157327730608435
                                Encrypted:false
                                SSDEEP:3072:lN9XD38z8b6/cFaWJsGv9o0OwlqeVnZFdTqdtk+NI:D9XDMgbPF0Gv60OwbvTt+N
                                MD5:971D710C2612F65B6DC5FACB2BA5AAC3
                                SHA1:5A84E0D34AC1B8F41435FF09056915FA347BE640
                                SHA-256:08552FC7C1FCDB754D81DAD78184AD191D0585B970A1B633CEF88CE63804947E
                                SHA-512:CA4A21028735F687CD883168CE2FD5D65EC4BC2A602AAE45A4729C3266DB62FDB2E4141A985DC726DD699FE98D3D039E117AA155D9E9EDCA438A2117F4949D35
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe, Author: Joe Security
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 61%
                                Reputation:unknown
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R5.d..............0.............N.... ........@.. .......................@............@.....................................K.......F.................... ....................................................... ............... ..H............text...T.... ...................... ..`.rsrc...F...........................@..@.reloc....... ......................@..B................0.......H............................................................................H>H}>.b..&.g......y.O.A..{...KF......'u..I...0.......u...y....8`.q.hSw/.a....\.=!t@K..n.z...~2.n.$.)...&#...L.t^X..t.com.apple.Safari...............ixKZ-...4.xV....4.xV....~...d...r...a...G...o...n...~...~...F...@...7...%...m...$...~....}.....is.......5..0.m..._.7...6q.~[b8...d.K.Z.S..h.wCLG.....kL..Rk.#NX..........=.K...!.........=.K...!.&..9..q...Sz.|........................................
                                Process:C:\Users\user\Desktop\Disable_automatic_email_errors.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:unknown
                                Preview:[ZoneTransfer]....ZoneId=0
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):5.3157327730608435
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:Disable_automatic_email_errors.exe
                                File size:252'928 bytes
                                MD5:971d710c2612f65b6dc5facb2ba5aac3
                                SHA1:5a84e0d34ac1b8f41435ff09056915fa347be640
                                SHA256:08552fc7c1fcdb754d81dad78184ad191d0585b970a1b633cef88ce63804947e
                                SHA512:ca4a21028735f687cd883168ce2fd5d65ec4bc2a602aae45a4729c3266db62fdb2e4141a985dc726dd699fe98d3d039e117aa155d9e9edca438a2117f4949d35
                                SSDEEP:3072:lN9XD38z8b6/cFaWJsGv9o0OwlqeVnZFdTqdtk+NI:D9XDMgbPF0Gv60OwbvTt+N
                                TLSH:7034FE037E48FB15E6A83937C2EF6D2413F1A0CB0673860B6F49AE6525416537E6E36C
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R5.d..............0.............N.... ........@.. .......................@............@................................
                                Icon Hash:90cececece8e8eb0
                                Entrypoint:0x43f14e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x64C63552 [Sun Jul 30 10:02:58 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3f1000x4b.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x546.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x420000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x3d1540x3d200False0.40309863880368096data5.32815211332084IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x400000x5460x600False0.3997395833333333data3.9890740197125236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x420000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x400a00x2bcdata0.44285714285714284
                                RT_MANIFEST0x4035c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Aug 3, 2023 15:54:02.060964108 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.061053038 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.061177015 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.084135056 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.084207058 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.545829058 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.546117067 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.551608086 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.551665068 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.552612066 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.592885017 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.774641991 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.814825058 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.922512054 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.922602892 CEST44349717173.231.16.76192.168.2.5
                                Aug 3, 2023 15:54:02.922702074 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:02.924038887 CEST49717443192.168.2.5173.231.16.76
                                Aug 3, 2023 15:54:04.853214979 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:05.014898062 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:05.017293930 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:05.628433943 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:05.636997938 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:05.798723936 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:05.801402092 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:05.965980053 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:05.966521978 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:06.138428926 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.138463020 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.138483047 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.138504028 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.138572931 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:06.138573885 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:06.140841007 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.186631918 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:06.348315001 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.357249975 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:06.518825054 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.522990942 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:06.685060978 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.685517073 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:06.853383064 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:06.853862047 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.015300989 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.015662909 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.185642958 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.186091900 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.347997904 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.355880976 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.356082916 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.356195927 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.356302977 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.520006895 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.520055056 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.520076990 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.520100117 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.521512032 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.561444044 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.732770920 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.895986080 CEST58749718103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:07.896075010 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.896532059 CEST49718587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:07.953730106 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:08.117723942 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:08.117866039 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:08.491868973 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:08.492029905 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:08.655824900 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:08.656322956 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:08.823014975 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:08.823740959 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.001853943 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.001955986 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.002017975 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.002073050 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.002110004 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.002186060 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.005470991 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.007431030 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.171188116 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.173660040 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.337599993 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.338141918 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.502240896 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.502888918 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.673640013 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.674087048 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:09.837968111 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:09.838553905 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.011584044 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.012142897 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.175945997 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.185378075 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.185671091 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.185797930 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.185940027 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.186077118 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.186183929 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.186285973 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:10.348927975 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.349041939 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.349116087 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.349179029 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.349241972 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.349302053 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.349359989 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.353594065 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:10.406064034 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:16.524733067 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:16.524827957 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:16.524971962 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:16.538777113 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:16.538851976 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:16.859675884 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:16.859900951 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:17.437663078 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:17.437731981 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:17.438337088 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:17.594223022 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:18.385575056 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:18.430799007 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:18.488370895 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:18.488465071 CEST4434972064.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:18.488543034 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:18.490827084 CEST49720443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:20.699285984 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:21.894304991 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:21.894471884 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:22.281714916 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.281985044 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:22.457453012 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.457691908 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:22.635792971 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.636277914 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:22.821680069 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.821707964 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.821727037 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.821747065 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.821801901 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:22.821803093 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:22.824091911 CEST58749721103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:22.875976086 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:23.620198011 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:23.620286942 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:23.620436907 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:23.629549026 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:23.629601955 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:23.956212997 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:23.956322908 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:23.961703062 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:23.961749077 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:23.962186098 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:24.016666889 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:24.180917025 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:24.222850084 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:24.283727884 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:24.283896923 CEST4434972264.185.227.156192.168.2.5
                                Aug 3, 2023 15:54:24.284087896 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:24.285085917 CEST49722443192.168.2.564.185.227.156
                                Aug 3, 2023 15:54:25.301714897 CEST49721587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:26.963839054 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:28.157387972 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:28.157675982 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:28.564657927 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:28.565188885 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:28.731561899 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:28.731966972 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:28.901004076 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:28.901964903 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.079310894 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.079359055 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.079391003 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.079417944 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.079451084 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.079529047 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.081315994 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.088952065 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.255740881 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.267824888 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.434266090 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.435201883 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.602125883 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.602730989 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.775162935 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.775619030 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:29.942028046 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:29.942336082 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.121006012 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.121336937 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.287563086 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.288748026 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.288932085 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.289062977 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.289161921 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.455075026 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.455137968 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.455179930 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.455216885 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.459157944 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.501534939 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.619093895 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.787499905 CEST58749723103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:30.787606001 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.788077116 CEST49723587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:30.841865063 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.074114084 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.074305058 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.261920929 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.262284040 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.437623978 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.437858105 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.618319035 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.618799925 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.805996895 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.806077003 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.806121111 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.806159019 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.806252003 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.806252003 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.808080912 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.820410967 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:32.996143103 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:32.997406006 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:33.172776937 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:33.173280001 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:33.349379063 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:33.349976063 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:33.532608032 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:33.544734001 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:33.720024109 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:33.722141981 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:33.911381006 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:33.911699057 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.086986065 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.087646961 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.087800980 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.087800980 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.087850094 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.087913036 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.087963104 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.088005066 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:54:34.264213085 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.264285088 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.264333010 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.264375925 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.264420986 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.264467955 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.264518976 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.268821955 CEST58749724103.211.239.66192.168.2.5
                                Aug 3, 2023 15:54:34.330091953 CEST49724587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:55:44.839380980 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:55:45.005958080 CEST58749719103.211.239.66192.168.2.5
                                Aug 3, 2023 15:55:45.006056070 CEST49719587192.168.2.5103.211.239.66
                                Aug 3, 2023 15:55:45.006671906 CEST49719587192.168.2.5103.211.239.66
                                TimestampSource PortDest PortSource IPDest IP
                                Aug 3, 2023 15:54:01.968673944 CEST4972453192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:02.003626108 CEST53497248.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:02.010869026 CEST6145253192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:02.045402050 CEST53614528.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:04.805252075 CEST6532353192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:04.850008011 CEST53653238.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:07.921372890 CEST5148453192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:07.949980021 CEST53514848.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:16.453155041 CEST6344653192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:16.487117052 CEST53634468.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:16.494508982 CEST5675153192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:16.514183044 CEST53567518.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:20.649677992 CEST5503953192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:20.697659969 CEST53550398.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:23.545010090 CEST6097553192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:23.573916912 CEST53609758.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:23.581034899 CEST5922053192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:23.610007048 CEST53592208.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:26.934053898 CEST5506853192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:26.962753057 CEST53550688.8.8.8192.168.2.5
                                Aug 3, 2023 15:54:30.805300951 CEST5668253192.168.2.58.8.8.8
                                Aug 3, 2023 15:54:30.840508938 CEST53566828.8.8.8192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Aug 3, 2023 15:54:01.968673944 CEST192.168.2.58.8.8.80xc007Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:02.010869026 CEST192.168.2.58.8.8.80xb879Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:04.805252075 CEST192.168.2.58.8.8.80xb423Standard query (0)mail.grabinphone.comA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:07.921372890 CEST192.168.2.58.8.8.80xe6eeStandard query (0)mail.grabinphone.comA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.453155041 CEST192.168.2.58.8.8.80x5a7dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.494508982 CEST192.168.2.58.8.8.80xc109Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:20.649677992 CEST192.168.2.58.8.8.80x6a7fStandard query (0)mail.grabinphone.comA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.545010090 CEST192.168.2.58.8.8.80x1cdStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.581034899 CEST192.168.2.58.8.8.80x71f3Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:26.934053898 CEST192.168.2.58.8.8.80xbe0dStandard query (0)mail.grabinphone.comA (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:30.805300951 CEST192.168.2.58.8.8.80x2adfStandard query (0)mail.grabinphone.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Aug 3, 2023 15:54:02.003626108 CEST8.8.8.8192.168.2.50xc007No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                Aug 3, 2023 15:54:02.003626108 CEST8.8.8.8192.168.2.50xc007No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:02.003626108 CEST8.8.8.8192.168.2.50xc007No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:02.003626108 CEST8.8.8.8192.168.2.50xc007No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:02.045402050 CEST8.8.8.8192.168.2.50xb879No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                Aug 3, 2023 15:54:02.045402050 CEST8.8.8.8192.168.2.50xb879No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:02.045402050 CEST8.8.8.8192.168.2.50xb879No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:02.045402050 CEST8.8.8.8192.168.2.50xb879No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:04.850008011 CEST8.8.8.8192.168.2.50xb423No error (0)mail.grabinphone.com103.211.239.66A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:07.949980021 CEST8.8.8.8192.168.2.50xe6eeNo error (0)mail.grabinphone.com103.211.239.66A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.487117052 CEST8.8.8.8192.168.2.50x5a7dNo error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                Aug 3, 2023 15:54:16.487117052 CEST8.8.8.8192.168.2.50x5a7dNo error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.487117052 CEST8.8.8.8192.168.2.50x5a7dNo error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.487117052 CEST8.8.8.8192.168.2.50x5a7dNo error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.514183044 CEST8.8.8.8192.168.2.50xc109No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                Aug 3, 2023 15:54:16.514183044 CEST8.8.8.8192.168.2.50xc109No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.514183044 CEST8.8.8.8192.168.2.50xc109No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:16.514183044 CEST8.8.8.8192.168.2.50xc109No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:20.697659969 CEST8.8.8.8192.168.2.50x6a7fNo error (0)mail.grabinphone.com103.211.239.66A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.573916912 CEST8.8.8.8192.168.2.50x1cdNo error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                Aug 3, 2023 15:54:23.573916912 CEST8.8.8.8192.168.2.50x1cdNo error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.573916912 CEST8.8.8.8192.168.2.50x1cdNo error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.573916912 CEST8.8.8.8192.168.2.50x1cdNo error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.610007048 CEST8.8.8.8192.168.2.50x71f3No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                Aug 3, 2023 15:54:23.610007048 CEST8.8.8.8192.168.2.50x71f3No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.610007048 CEST8.8.8.8192.168.2.50x71f3No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:23.610007048 CEST8.8.8.8192.168.2.50x71f3No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:26.962753057 CEST8.8.8.8192.168.2.50xbe0dNo error (0)mail.grabinphone.com103.211.239.66A (IP address)IN (0x0001)false
                                Aug 3, 2023 15:54:30.840508938 CEST8.8.8.8192.168.2.50x2adfNo error (0)mail.grabinphone.com103.211.239.66A (IP address)IN (0x0001)false
                                • api.ipify.org
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.549717173.231.16.76443C:\Users\user\Desktop\Disable_automatic_email_errors.exe
                                TimestampkBytes transferredDirectionData
                                2023-08-03 13:54:02 UTC0OUTGET / HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                Host: api.ipify.org
                                Connection: Keep-Alive
                                2023-08-03 13:54:02 UTC0INHTTP/1.1 200 OK
                                Server: nginx/1.25.1
                                Date: Thu, 03 Aug 2023 13:54:02 GMT
                                Content-Type: text/plain
                                Content-Length: 14
                                Connection: close
                                Vary: Origin
                                2023-08-03 13:54:02 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 30
                                Data Ascii: 102.129.143.30


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                1192.168.2.54972064.185.227.156443C:\Users\user\AppData\Roaming\ggh\ggh.exe
                                TimestampkBytes transferredDirectionData
                                2023-08-03 13:54:18 UTC0OUTGET / HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                Host: api.ipify.org
                                Connection: Keep-Alive
                                2023-08-03 13:54:18 UTC0INHTTP/1.1 200 OK
                                Server: nginx/1.25.1
                                Date: Thu, 03 Aug 2023 13:54:18 GMT
                                Content-Type: text/plain
                                Content-Length: 14
                                Connection: close
                                Vary: Origin
                                2023-08-03 13:54:18 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 30
                                Data Ascii: 102.129.143.30


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                2192.168.2.54972264.185.227.156443C:\Users\user\AppData\Roaming\ggh\ggh.exe
                                TimestampkBytes transferredDirectionData
                                2023-08-03 13:54:24 UTC0OUTGET / HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                Host: api.ipify.org
                                Connection: Keep-Alive
                                2023-08-03 13:54:24 UTC0INHTTP/1.1 200 OK
                                Server: nginx/1.25.1
                                Date: Thu, 03 Aug 2023 13:54:24 GMT
                                Content-Type: text/plain
                                Content-Length: 14
                                Connection: close
                                Vary: Origin
                                2023-08-03 13:54:24 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 30
                                Data Ascii: 102.129.143.30


                                TimestampSource PortDest PortSource IPDest IPCommands
                                Aug 3, 2023 15:54:05.628433943 CEST58749718103.211.239.66192.168.2.5220 cvsv--elite-mx01
                                Aug 3, 2023 15:54:05.636997938 CEST49718587192.168.2.5103.211.239.66EHLO 932923
                                Aug 3, 2023 15:54:05.798723936 CEST58749718103.211.239.66192.168.2.5250-cvsv--elite-mx01 Hello 932923 [102.129.143.30]
                                250-SIZE 52428800
                                250-8BITMIME
                                250-PIPELINING
                                250-PIPE_CONNECT
                                250-AUTH PLAIN LOGIN
                                250-STARTTLS
                                250 HELP
                                Aug 3, 2023 15:54:05.801402092 CEST49718587192.168.2.5103.211.239.66STARTTLS
                                Aug 3, 2023 15:54:05.965980053 CEST58749718103.211.239.66192.168.2.5220 TLS go ahead
                                Aug 3, 2023 15:54:08.491868973 CEST58749719103.211.239.66192.168.2.5220 cvsv--elite-mx01
                                Aug 3, 2023 15:54:08.492029905 CEST49719587192.168.2.5103.211.239.66EHLO 932923
                                Aug 3, 2023 15:54:08.655824900 CEST58749719103.211.239.66192.168.2.5250-cvsv--elite-mx01 Hello 932923 [102.129.143.30]
                                250-SIZE 52428800
                                250-8BITMIME
                                250-PIPELINING
                                250-PIPE_CONNECT
                                250-AUTH PLAIN LOGIN
                                250-STARTTLS
                                250 HELP
                                Aug 3, 2023 15:54:08.656322956 CEST49719587192.168.2.5103.211.239.66STARTTLS
                                Aug 3, 2023 15:54:08.823014975 CEST58749719103.211.239.66192.168.2.5220 TLS go ahead
                                Aug 3, 2023 15:54:22.281714916 CEST58749721103.211.239.66192.168.2.5220 cvsv--elite-mx01
                                Aug 3, 2023 15:54:22.281985044 CEST49721587192.168.2.5103.211.239.66EHLO 932923
                                Aug 3, 2023 15:54:22.457453012 CEST58749721103.211.239.66192.168.2.5250-cvsv--elite-mx01 Hello 932923 [102.129.143.30]
                                250-SIZE 52428800
                                250-8BITMIME
                                250-PIPELINING
                                250-PIPE_CONNECT
                                250-AUTH PLAIN LOGIN
                                250-STARTTLS
                                250 HELP
                                Aug 3, 2023 15:54:22.457691908 CEST49721587192.168.2.5103.211.239.66STARTTLS
                                Aug 3, 2023 15:54:22.635792971 CEST58749721103.211.239.66192.168.2.5220 TLS go ahead
                                Aug 3, 2023 15:54:28.564657927 CEST58749723103.211.239.66192.168.2.5220 cvsv--elite-mx01
                                Aug 3, 2023 15:54:28.565188885 CEST49723587192.168.2.5103.211.239.66EHLO 932923
                                Aug 3, 2023 15:54:28.731561899 CEST58749723103.211.239.66192.168.2.5250-cvsv--elite-mx01 Hello 932923 [102.129.143.30]
                                250-SIZE 52428800
                                250-8BITMIME
                                250-PIPELINING
                                250-PIPE_CONNECT
                                250-AUTH PLAIN LOGIN
                                250-STARTTLS
                                250 HELP
                                Aug 3, 2023 15:54:28.731966972 CEST49723587192.168.2.5103.211.239.66STARTTLS
                                Aug 3, 2023 15:54:28.901004076 CEST58749723103.211.239.66192.168.2.5220 TLS go ahead
                                Aug 3, 2023 15:54:32.261920929 CEST58749724103.211.239.66192.168.2.5220 cvsv--elite-mx01
                                Aug 3, 2023 15:54:32.262284040 CEST49724587192.168.2.5103.211.239.66EHLO 932923
                                Aug 3, 2023 15:54:32.437623978 CEST58749724103.211.239.66192.168.2.5250-cvsv--elite-mx01 Hello 932923 [102.129.143.30]
                                250-SIZE 52428800
                                250-8BITMIME
                                250-PIPELINING
                                250-PIPE_CONNECT
                                250-AUTH PLAIN LOGIN
                                250-STARTTLS
                                250 HELP
                                Aug 3, 2023 15:54:32.437858105 CEST49724587192.168.2.5103.211.239.66STARTTLS
                                Aug 3, 2023 15:54:32.618319035 CEST58749724103.211.239.66192.168.2.5220 TLS go ahead

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:15:54:00
                                Start date:03/08/2023
                                Path:C:\Users\user\Desktop\Disable_automatic_email_errors.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\Disable_automatic_email_errors.exe
                                Imagebase:0x290000
                                File size:252'928 bytes
                                MD5 hash:971D710C2612F65B6DC5FACB2BA5AAC3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.649418383.0000000002700000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.649418383.0000000002700000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000003.385931542.0000000005F97000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000000.381688362.0000000000292000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low

                                Target ID:1
                                Start time:15:54:13
                                Start date:03/08/2023
                                Path:C:\Users\user\AppData\Roaming\ggh\ggh.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\ggh\ggh.exe"
                                Imagebase:0xdb0000
                                File size:252'928 bytes
                                MD5 hash:971D710C2612F65B6DC5FACB2BA5AAC3
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.429886562.0000000003280000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.429886562.0000000003280000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Roaming\ggh\ggh.exe, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 61%, ReversingLabs
                                Reputation:low

                                Target ID:4
                                Start time:15:54:21
                                Start date:03/08/2023
                                Path:C:\Users\user\AppData\Roaming\ggh\ggh.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Roaming\ggh\ggh.exe"
                                Imagebase:0x590000
                                File size:252'928 bytes
                                MD5 hash:971D710C2612F65B6DC5FACB2BA5AAC3
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.649230805.0000000002970000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.649230805.0000000002970000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:9%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:2.3%
                                  Total number of Nodes:129
                                  Total number of Limit Nodes:13
                                  execution_graph 37198 2490448 37199 249044e 37198->37199 37200 249051b 37199->37200 37203 2490f10 37199->37203 37209 2490f02 37199->37209 37205 2490f16 37203->37205 37204 2491020 37204->37199 37205->37204 37215 609c4f8 37205->37215 37219 609c518 37205->37219 37223 24910c8 37205->37223 37211 2490f10 37209->37211 37210 2491020 37210->37199 37211->37210 37212 24910c8 2 API calls 37211->37212 37213 609c4f8 2 API calls 37211->37213 37214 609c518 2 API calls 37211->37214 37212->37211 37213->37211 37214->37211 37218 609c4fd 37215->37218 37217 609c5a5 37217->37205 37218->37217 37230 609c1c4 37218->37230 37220 609c52a 37219->37220 37221 609c1c4 2 API calls 37220->37221 37222 609c5a5 37220->37222 37221->37222 37222->37205 37225 24910df 37223->37225 37224 24911ea 37224->37205 37225->37224 37302 249f628 37225->37302 37307 249f638 37225->37307 37312 249f960 37225->37312 37317 249f970 37225->37317 37231 609c1cf 37230->37231 37235 609c7b8 37231->37235 37246 609c7ab 37231->37246 37232 609c7a2 37232->37217 37237 609c7da 37235->37237 37236 609c8e3 37236->37232 37237->37236 37257 609ceb0 37237->37257 37262 609cec0 37237->37262 37238 609ca50 37239 609b854 GetModuleHandleW 37238->37239 37241 609ca79 37238->37241 37240 609caa3 37239->37240 37244 609e2d0 CreateWindowExW 37240->37244 37245 609e300 CreateWindowExW 37240->37245 37244->37241 37245->37241 37247 609c7b8 37246->37247 37248 609c8e3 37247->37248 37253 609ceb0 GetModuleHandleW 37247->37253 37254 609cec0 GetModuleHandleW 37247->37254 37248->37232 37249 609ca50 37250 609b854 GetModuleHandleW 37249->37250 37252 609ca79 37249->37252 37251 609caa3 37250->37251 37291 609e300 37251->37291 37294 609e2d0 37251->37294 37253->37249 37254->37249 37258 609cec0 37257->37258 37259 609cf6e 37258->37259 37267 609d030 37258->37267 37277 609d027 37258->37277 37263 609ceed 37262->37263 37264 609cf6e 37263->37264 37265 609d030 GetModuleHandleW 37263->37265 37266 609d027 GetModuleHandleW 37263->37266 37265->37264 37266->37264 37268 609d045 37267->37268 37271 609d069 37268->37271 37287 609b854 37268->37287 37270 609d234 37270->37259 37271->37270 37272 609b854 GetModuleHandleW 37271->37272 37273 609d1ba 37272->37273 37273->37270 37274 609b854 GetModuleHandleW 37273->37274 37275 609d208 37274->37275 37275->37270 37276 609b854 GetModuleHandleW 37275->37276 37276->37270 37278 609d02e 37277->37278 37279 609b854 GetModuleHandleW 37278->37279 37280 609d069 37278->37280 37279->37280 37281 609b854 GetModuleHandleW 37280->37281 37286 609d234 37280->37286 37282 609d1ba 37281->37282 37283 609b854 GetModuleHandleW 37282->37283 37282->37286 37284 609d208 37283->37284 37285 609b854 GetModuleHandleW 37284->37285 37284->37286 37285->37286 37286->37259 37288 609d370 GetModuleHandleW 37287->37288 37290 609d3e5 37288->37290 37290->37271 37298 609c4b4 37291->37298 37295 609e300 37294->37295 37296 609c4b4 CreateWindowExW 37295->37296 37297 609e335 37296->37297 37297->37252 37299 609e350 CreateWindowExW 37298->37299 37301 609e474 37299->37301 37303 249f650 37302->37303 37306 249f6af 37303->37306 37322 249f1dc 37303->37322 37306->37225 37308 249f650 37307->37308 37309 249f1dc GetUserNameW 37308->37309 37311 249f6af 37308->37311 37310 249f6a1 37309->37310 37310->37225 37311->37225 37313 249f988 37312->37313 37316 249f9e6 37313->37316 37326 249f1f4 GetUserNameW 37313->37326 37318 249f988 37317->37318 37321 249f9e6 37318->37321 37327 249f1f4 GetUserNameW 37318->37327 37324 249f770 GetUserNameW 37322->37324 37325 249f8bd 37324->37325 37350 609d368 37351 609d3b8 GetModuleHandleW 37350->37351 37352 609d3b2 37350->37352 37353 609d3e5 37351->37353 37352->37351 37328 609fc00 37329 609fc66 37328->37329 37333 609fdb0 37329->37333 37336 609fdc0 37329->37336 37330 609fd15 37339 609f7d4 37333->37339 37337 609f7d4 DuplicateHandle 37336->37337 37338 609fdee 37336->37338 37337->37338 37338->37330 37340 609fe28 DuplicateHandle 37339->37340 37341 609fdee 37340->37341 37341->37330 37342 2495b90 37343 2495bae 37342->37343 37346 2495adc 37343->37346 37345 2495be5 37347 24976b0 LoadLibraryA 37346->37347 37349 24977a9 37347->37349 37354 609a937 37355 609a941 37354->37355 37358 6098010 37355->37358 37357 609a94f 37359 6098025 37358->37359 37360 6098270 37359->37360 37361 6098630 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 37359->37361 37362 6098690 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 37359->37362 37363 60986a0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 37359->37363 37360->37357 37361->37359 37362->37359 37363->37359

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 123 249f1dc-249f7cf 125 249f83a-249f83e 123->125 126 249f7d1-249f7fc 123->126 127 249f869-249f874 125->127 128 249f840-249f863 125->128 132 249f82c 126->132 133 249f7fe-249f800 126->133 130 249f880-249f8bb GetUserNameW 127->130 131 249f876-249f87e 127->131 128->127 134 249f8bd-249f8c3 130->134 135 249f8c4-249f8da 130->135 131->130 144 249f831-249f834 132->144 137 249f822-249f82a 133->137 138 249f802-249f80c 133->138 134->135 139 249f8dc-249f8e8 135->139 140 249f8f0-249f917 135->140 137->144 141 249f80e 138->141 142 249f810-249f81e 138->142 139->140 149 249f919-249f91d 140->149 150 249f927 140->150 141->142 142->142 147 249f820 142->147 144->125 147->137 149->150 151 249f91f 149->151 152 249f928 150->152 151->150 152->152
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0249F8AB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: 73ac044e25fc3825de51bd2cfb6c8060aed8f75d9f07213b6002082dfd60a34c
                                  • Instruction ID: d381351f13bf29d5c7037a68c5f34e68c73f364fc42e1a34365919d703cd86f9
                                  • Opcode Fuzzy Hash: 73ac044e25fc3825de51bd2cfb6c8060aed8f75d9f07213b6002082dfd60a34c
                                  • Instruction Fuzzy Hash: 26510270E002188FDF14CFA9C895BDEBBB1BF48314F25812AE815BB750DB74A849CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7c4c50f8ac8356dd92299297dd82fb27c090208125afd60c9a28fdffea6804b
                                  • Instruction ID: 48da964e8d47ef0eb2867547d42af0bad5cb879b8150c9bd3d2630930b985341
                                  • Opcode Fuzzy Hash: f7c4c50f8ac8356dd92299297dd82fb27c090208125afd60c9a28fdffea6804b
                                  • Instruction Fuzzy Hash: 8C625B30B042049FEB14EB68D454BEDB7E6EF84310F148869E50AEBB51DBB5ED42CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 019bb027c76004a843c4999365956222fc1b5d29e83a8a3023fb03856728382b
                                  • Instruction ID: e0fef8e52515d55149d250c66f800a825ad085a1941fe245304501075a361b34
                                  • Opcode Fuzzy Hash: 019bb027c76004a843c4999365956222fc1b5d29e83a8a3023fb03856728382b
                                  • Instruction Fuzzy Hash: DD426D70F101089FDF94EBA8C4506AEBBF3AB89350F144469E40AEB781DE34DD429BA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5cf16a4300df9293c78d13ffb968074797d758fec5bd4b71599b791fe31d343b
                                  • Instruction ID: f086db325497bd44d18dd27fa49482321234805be919a9d11449aba669ea2339
                                  • Opcode Fuzzy Hash: 5cf16a4300df9293c78d13ffb968074797d758fec5bd4b71599b791fe31d343b
                                  • Instruction Fuzzy Hash: A8223070F501099BEFA8DBA8C4907AEBBF2EB45310F50442AE456EB781DA25DC41DFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f1e3bad6561246ea3b216db23f38b95c744b9a17d1327133fe47643ee8b99af7
                                  • Instruction ID: cc5dc9e7e4bd590b4c1317eaf74750394ba24d2f51d5401e0af70a0b884de6f4
                                  • Opcode Fuzzy Hash: f1e3bad6561246ea3b216db23f38b95c744b9a17d1327133fe47643ee8b99af7
                                  • Instruction Fuzzy Hash: 7F228231B201048FDF94DB78C494AAEBBE3EF85710F248469E40ADB391DB35EC419BA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e61d73778c39d91404e1d117c1bec9ba7c8bc57984b7fa47440d0a81e7ca0d2
                                  • Instruction ID: ef058532c5c238ef3034ab5e8a49e89c22bb98750112c646c5bb48830e3cbc0d
                                  • Opcode Fuzzy Hash: 6e61d73778c39d91404e1d117c1bec9ba7c8bc57984b7fa47440d0a81e7ca0d2
                                  • Instruction Fuzzy Hash: 2D02A130B042159FEB14EBB8C8507AEB7E2BF84310F149469E506DBB95DFB5ED428B90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: f8a714725a6096583428c957b7d49d6349b7f38642221556d727bc9507fd0d2c
                                  • Instruction ID: f5b222293b103d094cc779f717cea5ff2d98676e514a4ef1a79b6185dc9f29fe
                                  • Opcode Fuzzy Hash: f8a714725a6096583428c957b7d49d6349b7f38642221556d727bc9507fd0d2c
                                  • Instruction Fuzzy Hash: 1CD16E70E40208DFCF45EFB8D8545AEBBB2FF88300F148429E506AB354DB38A946DB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4389db397d6ec217525d52f0e570fbb564649637d3c1d5d42266c5f50cc44c8c
                                  • Instruction ID: f191b2a02174016c96a3970033d193446ba81d7bb629fc05604aff55f407c3ea
                                  • Opcode Fuzzy Hash: 4389db397d6ec217525d52f0e570fbb564649637d3c1d5d42266c5f50cc44c8c
                                  • Instruction Fuzzy Hash: CDD13875E00209CFCF14DFA8D484AAEBBF6FF88314F14855AE415AB361DB34A946CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39db1d65dc8bf5fed25f2c0941982deb0f000823785bc27ca214e735b0f8bbef
                                  • Instruction ID: a143f7f579e81ac3df48140c7a5de067dc6e8df085331469c91b619e3228f779
                                  • Opcode Fuzzy Hash: 39db1d65dc8bf5fed25f2c0941982deb0f000823785bc27ca214e735b0f8bbef
                                  • Instruction Fuzzy Hash: 82B12C70E00219CFDF14CFA9D99579EBFF2AF88714F14812AE815AB394DB749885CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 09e944be865177df82d5c9f63af21df652df3aa9debb59d304aeff88ef784e25
                                  • Instruction ID: bafd18dfe12cffcabb15b1dbd07dadfea36534f77396fa1b461b9214dbf479c3
                                  • Opcode Fuzzy Hash: 09e944be865177df82d5c9f63af21df652df3aa9debb59d304aeff88ef784e25
                                  • Instruction Fuzzy Hash: 01912770E002199FDF10CFA9C9857EEBFF2AF88718F14812AE405A7294DB759985CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 98 609a138-609a143 99 609a16d-609a18c call 6098620 98->99 100 609a145-609a16c call 6098614 98->100 106 609a18e-609a191 99->106 107 609a192-609a1f1 99->107 114 609a1f3-609a1f6 107->114 115 609a1f7-609a284 GlobalMemoryStatusEx 107->115 119 609a28d-609a2b5 115->119 120 609a286-609a28c 115->120 120->119
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce646340edc8a16599e40a3dcb08c1acd87267b2d563d8725a969bf638c674a5
                                  • Instruction ID: 5be75b123e1a3e87843d5e104b9bfa2180351679e17805a6e3cba7d508d2eb15
                                  • Opcode Fuzzy Hash: ce646340edc8a16599e40a3dcb08c1acd87267b2d563d8725a969bf638c674a5
                                  • Instruction Fuzzy Hash: 61410172E043958FCB10CFA9D8146DEBFF5EF8A210F1485AAE405EB241DB749985CBE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 153 249f1f4-249f7cf 155 249f83a-249f83e 153->155 156 249f7d1-249f7fc 153->156 157 249f869-249f874 155->157 158 249f840-249f863 155->158 162 249f82c 156->162 163 249f7fe-249f800 156->163 160 249f880-249f8bb GetUserNameW 157->160 161 249f876-249f87e 157->161 158->157 164 249f8bd-249f8c3 160->164 165 249f8c4-249f8da 160->165 161->160 174 249f831-249f834 162->174 167 249f822-249f82a 163->167 168 249f802-249f80c 163->168 164->165 169 249f8dc-249f8e8 165->169 170 249f8f0-249f917 165->170 167->174 171 249f80e 168->171 172 249f810-249f81e 168->172 169->170 179 249f919-249f91d 170->179 180 249f927 170->180 171->172 172->172 177 249f820 172->177 174->155 177->167 179->180 181 249f91f 179->181 182 249f928 180->182 181->180 182->182
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0249F8AB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: 533db5da0fe4f8ed1a2dabc1caedd1b4915009ef6a4865efbaf05d01fadb47eb
                                  • Instruction ID: b7141fa38d54747c9f697cfd137a637f73dc409b2e657e4b23bb842d384bc39c
                                  • Opcode Fuzzy Hash: 533db5da0fe4f8ed1a2dabc1caedd1b4915009ef6a4865efbaf05d01fadb47eb
                                  • Instruction Fuzzy Hash: A851F270E102188FDF14CFA9C895BDEBBB1BF48314F25812AE815AB750D774A849CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 183 249f764-249f7cf 184 249f83a-249f83e 183->184 185 249f7d1-249f7fc 183->185 186 249f869-249f874 184->186 187 249f840-249f863 184->187 191 249f82c 185->191 192 249f7fe-249f800 185->192 189 249f880-249f8bb GetUserNameW 186->189 190 249f876-249f87e 186->190 187->186 193 249f8bd-249f8c3 189->193 194 249f8c4-249f8da 189->194 190->189 203 249f831-249f834 191->203 196 249f822-249f82a 192->196 197 249f802-249f80c 192->197 193->194 198 249f8dc-249f8e8 194->198 199 249f8f0-249f917 194->199 196->203 200 249f80e 197->200 201 249f810-249f81e 197->201 198->199 208 249f919-249f91d 199->208 209 249f927 199->209 200->201 201->201 206 249f820 201->206 203->184 206->196 208->209 210 249f91f 208->210 211 249f928 209->211 210->209 211->211
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0249F8AB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: 6203b257108e78543fddda8230e6515d140447acc0b27da73a5ea08255af8288
                                  • Instruction ID: 4a3e36b31d8338918d3f70fb2cba2945d0284f2911139f13b21e54ad32dcac70
                                  • Opcode Fuzzy Hash: 6203b257108e78543fddda8230e6515d140447acc0b27da73a5ea08255af8288
                                  • Instruction Fuzzy Hash: 145103B0E002188FDF14CFA9C895BDEBBB1BF48314F25812AE815AB750D774A849CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 212 609c4b4-609e3b6 214 609e3b8-609e3be 212->214 215 609e3c1-609e3c8 212->215 214->215 216 609e3ca-609e3d0 215->216 217 609e3d3-609e472 CreateWindowExW 215->217 216->217 219 609e47b-609e4b3 217->219 220 609e474-609e47a 217->220 224 609e4c0 219->224 225 609e4b5-609e4b8 219->225 220->219 226 609e4c1 224->226 225->224 226->226
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0609E462
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 09a04ffe21c105bb8ed4aacce2bbc6a2076dc63d70977077f4af0cf39965f68a
                                  • Instruction ID: 0e5e765ed7a10181433ccfa188673bd83cc38d909554ddc87ba59f6502a9d0e0
                                  • Opcode Fuzzy Hash: 09a04ffe21c105bb8ed4aacce2bbc6a2076dc63d70977077f4af0cf39965f68a
                                  • Instruction Fuzzy Hash: 805190B1D002099FDF54CFA9C984ADEBFB5BF48310F64852AE819AB210D774A885DF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 227 609e344-609e3b6 228 609e3b8-609e3be 227->228 229 609e3c1-609e3c8 227->229 228->229 230 609e3ca-609e3d0 229->230 231 609e3d3-609e40b 229->231 230->231 232 609e413-609e472 CreateWindowExW 231->232 233 609e47b-609e4b3 232->233 234 609e474-609e47a 232->234 238 609e4c0 233->238 239 609e4b5-609e4b8 233->239 234->233 240 609e4c1 238->240 239->238 240->240
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0609E462
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: a4e813163ed341d5b35b64c56d957fa1993af29848111e6587a365307471e6c4
                                  • Instruction ID: 457da8d978104340dfe6015be1db5656bb654223bb78c1d466a670798efe230f
                                  • Opcode Fuzzy Hash: a4e813163ed341d5b35b64c56d957fa1993af29848111e6587a365307471e6c4
                                  • Instruction Fuzzy Hash: 4851B0B1D003099FDF14CFA9C994ADEBFB6BF48310F24852AE819AB210D7749985CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 241 24976a4-2497707 242 2497709-249772e 241->242 243 249775b-24977a7 LoadLibraryA 241->243 242->243 248 2497730-2497732 242->248 246 24977a9-24977af 243->246 247 24977b0-24977e1 243->247 246->247 253 24977f1 247->253 254 24977e3-24977e7 247->254 250 2497755-2497758 248->250 251 2497734-249773e 248->251 250->243 255 2497740 251->255 256 2497742-2497751 251->256 259 24977f2 253->259 254->253 257 24977e9 254->257 255->256 256->256 258 2497753 256->258 257->253 258->250 259->259
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 38dab859593c618c4061e1a50cf7826c3ed293c5957e9d97098b89e79a4aa659
                                  • Instruction ID: 6fb7fa9ac89b75fbabb8728d7ec39ac5f088e797b6c408242f3687bdfd0e7455
                                  • Opcode Fuzzy Hash: 38dab859593c618c4061e1a50cf7826c3ed293c5957e9d97098b89e79a4aa659
                                  • Instruction Fuzzy Hash: 5A4146B1D106188FDB10CFA9C9857DEFBF1AB48314F14816AE815EB344E779A886CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 260 2495adc-2497707 262 2497709-249772e 260->262 263 249775b-24977a7 LoadLibraryA 260->263 262->263 268 2497730-2497732 262->268 266 24977a9-24977af 263->266 267 24977b0-24977e1 263->267 266->267 273 24977f1 267->273 274 24977e3-24977e7 267->274 270 2497755-2497758 268->270 271 2497734-249773e 268->271 270->263 275 2497740 271->275 276 2497742-2497751 271->276 279 24977f2 273->279 274->273 277 24977e9 274->277 275->276 276->276 278 2497753 276->278 277->273 278->270 279->279
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: a723e7b9f4579a30db4030105323ea0c507c7613dcbbc3861e4f0055315bd6e9
                                  • Instruction ID: 558e1a4912cc2ecbaa730fc7cb55bbc70d1102498c0f5c9be2d2cad4ebc1df41
                                  • Opcode Fuzzy Hash: a723e7b9f4579a30db4030105323ea0c507c7613dcbbc3861e4f0055315bd6e9
                                  • Instruction Fuzzy Hash: 794135B0E106088FDB10CFA9C98579EFFF1AB48714F10816AE815AB340D775A882CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 901 609fe21-609fe26 902 609fe28-609febc DuplicateHandle 901->902 903 609febe-609fec4 902->903 904 609fec5-609fee2 902->904 903->904
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0609FDEE,?,?,?,?,?), ref: 0609FEAF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 1e2bfb3d46e4b9f361a46ead5452472b4e24dd9e10ef5135c8d09dd79a9121ad
                                  • Instruction ID: 97739a38048f6466162472f7ba2e17df32490151698d899cb1d010b8b414095b
                                  • Opcode Fuzzy Hash: 1e2bfb3d46e4b9f361a46ead5452472b4e24dd9e10ef5135c8d09dd79a9121ad
                                  • Instruction Fuzzy Hash: 7C2103B59012099FCB10CFAAD984ADEFFF8EF48320F14841AE854A7310D374A984DFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 907 609f7d4-609febc DuplicateHandle 909 609febe-609fec4 907->909 910 609fec5-609fee2 907->910 909->910
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0609FDEE,?,?,?,?,?), ref: 0609FEAF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: ef867407891cba5e538652533c05d838d83962e10953a26c5827e217f9200681
                                  • Instruction ID: 22d040be2e56bb97093c6ea570eb2a0ac3c1891ea32c6c46cf0b798fdb7c452f
                                  • Opcode Fuzzy Hash: ef867407891cba5e538652533c05d838d83962e10953a26c5827e217f9200681
                                  • Instruction Fuzzy Hash: F521E4B5D002099FDB50CFAAD984ADEBFF9EB48320F14841AE914B7310D374A954DFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 913 609b837-609d3b0 916 609d3b8-609d3e3 GetModuleHandleW 913->916 917 609d3b2-609d3b5 913->917 918 609d3ec-609d400 916->918 919 609d3e5-609d3eb 916->919 917->916 919->918
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0609D3D6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 88aca5c9677031b97b67da3060bc80d10d6360bdb6e3a46350d556c76ca71842
                                  • Instruction ID: 2be718ee63178af63e4a35045acb6d9938c467bfa558fabaeb099c62a6dbd40b
                                  • Opcode Fuzzy Hash: 88aca5c9677031b97b67da3060bc80d10d6360bdb6e3a46350d556c76ca71842
                                  • Instruction Fuzzy Hash: 312187B18043888FCB11CFAAC8447CEBFF0EF49224F1480AAC455AB242C378A446CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 921 609a208-609a24e 923 609a256-609a284 GlobalMemoryStatusEx 921->923 924 609a28d-609a2b5 923->924 925 609a286-609a28c 923->925 925->924
                                  APIs
                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0609A18A), ref: 0609A277
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID:
                                  • API String ID: 1890195054-0
                                  • Opcode ID: f39c373909b36401c10a9b5a2fa2cd881d175122042c384e0a0715f96018dacd
                                  • Instruction ID: e2e22d33f784c8e4b8111c2b76ae0aac9015772e7dc32a53bd2c6bb9c6ee492d
                                  • Opcode Fuzzy Hash: f39c373909b36401c10a9b5a2fa2cd881d175122042c384e0a0715f96018dacd
                                  • Instruction Fuzzy Hash: A911F2B1D006199FCB10CF9AD944BDEFBF4AF48720F14856AE818B7240D778A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 928 6098620-609a284 GlobalMemoryStatusEx 931 609a28d-609a2b5 928->931 932 609a286-609a28c 928->932 932->931
                                  APIs
                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0609A18A), ref: 0609A277
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID:
                                  • API String ID: 1890195054-0
                                  • Opcode ID: d48046a1cac3a7b9c0e19a158740a5612fe0b0d078c0a1cddaca1613a23c6347
                                  • Instruction ID: ddc6f7158b62c3eb895c5847ec54413bf009786c0427fa1da3b0271e9d99091c
                                  • Opcode Fuzzy Hash: d48046a1cac3a7b9c0e19a158740a5612fe0b0d078c0a1cddaca1613a23c6347
                                  • Instruction Fuzzy Hash: 5711FFB1D046199BCB50CF9AC944BDEFBF4AB48320F14856AE818B7240D379AA45CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 935 609b854-609d3b0 937 609d3b8-609d3e3 GetModuleHandleW 935->937 938 609d3b2-609d3b5 935->938 939 609d3ec-609d400 937->939 940 609d3e5-609d3eb 937->940 938->937 940->939
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0609D3D6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: d1b396189d6fb499b4e4803cbfc0cedb2931f4043e402dc57bbf0abee22669cc
                                  • Instruction ID: b5df93119c969b7f7d8ca31e5835f25db307de5b2a6f8819b39a70ffbd5f7079
                                  • Opcode Fuzzy Hash: d1b396189d6fb499b4e4803cbfc0cedb2931f4043e402dc57bbf0abee22669cc
                                  • Instruction Fuzzy Hash: AB11F0B5C406098FCB60CFAAC544BDEFBF5AF88220F10856AD819B7640C374A545CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0609D3D6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 207302e195fddacf7d41a0bf303c03b63bad557676bec1be65110da84a4915b1
                                  • Instruction ID: 167b6f731eb0e59efc1f654216b74ccbd45c024551d09beb7f2e2b1f1650ed58
                                  • Opcode Fuzzy Hash: 207302e195fddacf7d41a0bf303c03b63bad557676bec1be65110da84a4915b1
                                  • Instruction Fuzzy Hash: AE11F0B2C006498FCB50CFAAD544ADEFBF5AF88324F10856AD859BB640D374A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d7a7dacdea816f2fb4ffeff41ed7e3db28562e0f1b3ff4494c9e4ce97548743
                                  • Instruction ID: 468ba8e52e4d795ba0779ef78c661c3a30897dcb4253f8aa217e12b96ddb725b
                                  • Opcode Fuzzy Hash: 1d7a7dacdea816f2fb4ffeff41ed7e3db28562e0f1b3ff4494c9e4ce97548743
                                  • Instruction Fuzzy Hash: 9BF13C70B042088FEB14EBB8C4506AEBBA7BF84300F20846DD51A9B795DFB5ED41DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 903d5d5df069f5a2c3dbb59a57a43aab9c4e3f0f07d925b01a9ba0d102c46c4d
                                  • Instruction ID: 6b5ebe092f4009912b244e02a0941d85f36b989bb0be6a20074e7df18864a32b
                                  • Opcode Fuzzy Hash: 903d5d5df069f5a2c3dbb59a57a43aab9c4e3f0f07d925b01a9ba0d102c46c4d
                                  • Instruction Fuzzy Hash: BE614E70A002589FEB14EBA9D451AEEBBB6BF85300F204469D406EB754DBB4AD41CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f05759dd67cce559489f879335077fd2e4e9bbf45029f686f1a84032a528052
                                  • Instruction ID: 57c45093eef21b895c321e165cf07c308f838a6acf7c6b117a0ed158b32ce01d
                                  • Opcode Fuzzy Hash: 0f05759dd67cce559489f879335077fd2e4e9bbf45029f686f1a84032a528052
                                  • Instruction Fuzzy Hash: 9621A131B101045FEF14EAADD4546EEB7FBEBC4220F144429E509DB780EAB4DD018BD5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f969a024d86c1b06dfd04881606d17633d8f9730f0c30b11d0185df349bf8f4
                                  • Instruction ID: f9fbf0b67281bf685bdddd2d5fd42d5e9ad35f81cccbe1eb7d8aa344ed12f1dd
                                  • Opcode Fuzzy Hash: 1f969a024d86c1b06dfd04881606d17633d8f9730f0c30b11d0185df349bf8f4
                                  • Instruction Fuzzy Hash: 2C210830F042088BEB14EBA8D551AEEB7BABB85301F205069D909EBA51DBB0ED41DF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fda4744598ea84af44f6baebe7472d9bf4730a32e3ae00bc59a8a568db4110cb
                                  • Instruction ID: 72eaebf4b7df5f20ec5bfa47fa4087e7ba5ace893a8772fff5389c5520c64452
                                  • Opcode Fuzzy Hash: fda4744598ea84af44f6baebe7472d9bf4730a32e3ae00bc59a8a568db4110cb
                                  • Instruction Fuzzy Hash: FC312B78AC13409FE3059F20E4447A97BF6F74A355F10A429EA458B3CADB790C81DF11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c39de719d3c9021a7302d4f9db89e07c679d43154a2a2920f20446759133994
                                  • Instruction ID: 59c02ebe26e3456ac39b383bacc6645aba4ea8db8465072ec73ed60e0e137798
                                  • Opcode Fuzzy Hash: 7c39de719d3c9021a7302d4f9db89e07c679d43154a2a2920f20446759133994
                                  • Instruction Fuzzy Hash: 66212A78AC13409FE3089F20E44476977EAF38A755F00A029AA454B3C9DF791C81DF11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 781e37efff963b7def2d80f0dc23e0f9f71c148d2b3b967bdefa53b848ff302a
                                  • Instruction ID: d052823415381fb1ae828855bfb214db8a0110f7878867d2711405bb6f22073e
                                  • Opcode Fuzzy Hash: 781e37efff963b7def2d80f0dc23e0f9f71c148d2b3b967bdefa53b848ff302a
                                  • Instruction Fuzzy Hash: 61012832B181145BAF24A9B15C007FF769BAB841A0F045079DE06E7E50DEE0D901C7E2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21b0bf766d5ec9cb16b2d607d83a5f3573d5402bf398642770dcb0e4513e1931
                                  • Instruction ID: 70a5948089339dca3c20201e082905189b0bad74b1b04f7c19460feae26f996d
                                  • Opcode Fuzzy Hash: 21b0bf766d5ec9cb16b2d607d83a5f3573d5402bf398642770dcb0e4513e1931
                                  • Instruction Fuzzy Hash: 34630931D10B1A8ADB11EF68C8945E9F7B1FF99300F15C69AE558B7221EB70AAC4CF41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 048c2f30ee2a536de5d54b34db466be485dc5af3a4c9408a4649ffe9b09c87e8
                                  • Instruction ID: 5312858a6dc42045576d8a3a59ef04ee3cc71051a0c34c043e33a97cd9239722
                                  • Opcode Fuzzy Hash: 048c2f30ee2a536de5d54b34db466be485dc5af3a4c9408a4649ffe9b09c87e8
                                  • Instruction Fuzzy Hash: 65333B31D10A198EDB11EF68C894AEDF7B1FF89300F14C79AE559A7211EB70AAC5CB41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-3993045852
                                  • Opcode ID: 224fa8695f40f376808fafaa3abe8063d548a8477e011862230aae386a851029
                                  • Instruction ID: 1c6ee709250f4ff577366fc7fc19621f87861d8e649d64e97c4a76c8839364e3
                                  • Opcode Fuzzy Hash: 224fa8695f40f376808fafaa3abe8063d548a8477e011862230aae386a851029
                                  • Instruction Fuzzy Hash: 16227F31F0021A8FEF24DBA8C490AEEBBB2FB85310F10856AD515EB741DAB5DD45CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef4669efff73c18e86edbb76332a603d9dd0b6cb8b45e10c19d6ad8db4684612
                                  • Instruction ID: 7f9243b3a652f65cb8baef836388d19b1f2dd87d80f368cff5d682ed30319363
                                  • Opcode Fuzzy Hash: ef4669efff73c18e86edbb76332a603d9dd0b6cb8b45e10c19d6ad8db4684612
                                  • Instruction Fuzzy Hash: 19328F70B002149FEB14DB68D484BADBBB2FF88310F248869E50ADB751DBB5DD45CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e417a36f25efb05fd5079f180746cd9f5591da98394204da39f15dd3c13b99e3
                                  • Instruction ID: 5e5c49532368e48654fe0c6df457360cd955229fdb5ddc5d103c4f6e75ad8045
                                  • Opcode Fuzzy Hash: e417a36f25efb05fd5079f180746cd9f5591da98394204da39f15dd3c13b99e3
                                  • Instruction Fuzzy Hash: F7421E31E10619CFDB14EBB5C8506DEB7B2BFC9300F5086AAD509AB650EF70A985CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.659454457.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_53b0000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49a100dfa70e3ca7b40fede4ae11686a88e293c0d56501a75504d313c1b2bfb3
                                  • Instruction ID: 1eddf78a66a3f8dab5178738c95ad3ab45ea3cefb599b7f5aa026693efc49e2c
                                  • Opcode Fuzzy Hash: 49a100dfa70e3ca7b40fede4ae11686a88e293c0d56501a75504d313c1b2bfb3
                                  • Instruction Fuzzy Hash: 74D1D731B000148FEF14DB68D494BFEB7A6FB89710F24896AE60ADB751CAB1DC45C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c91bbb9eb08f041aec68559a1b1e6dda020794e487153f12fb77592d3b806b10
                                  • Instruction ID: bcebe54d11514d4caad367c5aa8010f312656937fcde79577417468a968d51b1
                                  • Opcode Fuzzy Hash: c91bbb9eb08f041aec68559a1b1e6dda020794e487153f12fb77592d3b806b10
                                  • Instruction Fuzzy Hash: 7E12ECF9C917468BD310CF66E488149BBE1B76132DBD04A0AD2611BAD1F7B4116EEF4C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ae6220845beba2c605df5c31bc96def33911df13308f825dc548b336aa7b1bb
                                  • Instruction ID: 75fb5981c607f2abf06f7311095828cb1aa4aecd82ba6ee0ee7fdaeb3a5953da
                                  • Opcode Fuzzy Hash: 9ae6220845beba2c605df5c31bc96def33911df13308f825dc548b336aa7b1bb
                                  • Instruction Fuzzy Hash: 9DB11B70E00219CFDF14CFA9C9857AEBBF2AF89714F14812AD819AB354DB749845CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.660080112.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6090000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a0b91e65225d46ff6f000611910fb6fcbfa820803dfa805f1c6555d5ce648348
                                  • Instruction ID: 76c489a30354203cd3917bab2305c3db98232cc18fe145c1f16c6e52ea8221a7
                                  • Opcode Fuzzy Hash: a0b91e65225d46ff6f000611910fb6fcbfa820803dfa805f1c6555d5ce648348
                                  • Instruction Fuzzy Hash: 0FC14EB9C917458BD310CF26E888189BBF1BB6532DFD04B0AD1616B6D1E7B4106EEF48
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 15f3364430bf2e152f1cbeced15a56d61f5bcca77eb904b8c725a3ef2a7e6927
                                  • Instruction ID: 1220d52948e268ee2d7f2efd76cb023d681dc825dd14001677467aa1b363a61a
                                  • Opcode Fuzzy Hash: 15f3364430bf2e152f1cbeced15a56d61f5bcca77eb904b8c725a3ef2a7e6927
                                  • Instruction Fuzzy Hash: 5751226180E3D09ED707A77C6C757C63FB16F13654F4A49E7C0C2CA4A3E7188889E66A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.648946981.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2490000_Disable_automatic_email_errors.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44558d3759372e74651ea72f003e5880638a759b7235f4f47e4bf947065313a6
                                  • Instruction ID: 209000905315167f3201be6c4f1be15b22b3d38c9a562542381778d4e4f0f37b
                                  • Opcode Fuzzy Hash: 44558d3759372e74651ea72f003e5880638a759b7235f4f47e4bf947065313a6
                                  • Instruction Fuzzy Hash: FB4182A281C6E64BEB36463D48691EAFFA0AB5327CF2C13CBC4E1892D3D3956156D344
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:17.5%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:140
                                  Total number of Limit Nodes:9
                                  execution_graph 34846 17b0448 34848 17b044e 34846->34848 34847 17b051b 34848->34847 34851 17b0f02 34848->34851 34857 17b0f10 34848->34857 34852 17b0f16 34851->34852 34853 17b1020 34852->34853 34863 6cc0560 34852->34863 34868 17b10c8 34852->34868 34876 17b11ef 34852->34876 34853->34848 34860 17b0f16 34857->34860 34858 17b1020 34858->34848 34859 6cc0560 3 API calls 34859->34860 34860->34858 34860->34859 34861 17b10c8 2 API calls 34860->34861 34862 17b11ef 2 API calls 34860->34862 34861->34860 34862->34860 34864 6cc056a 34863->34864 34865 6cc058a 34864->34865 34888 6cf7d8b 34864->34888 34930 6cf7d98 34864->34930 34865->34852 34869 17b10d8 34868->34869 34870 17b11ea 34869->34870 34875 17b11ef 2 API calls 34869->34875 34972 17bf638 34869->34972 34977 17bf628 34869->34977 34982 17bf970 34869->34982 34987 17bf96b 34869->34987 34870->34852 34875->34869 34877 17b1188 34876->34877 34880 17b11f3 34876->34880 34881 17bf96b GetUserNameW 34877->34881 34882 17bf970 GetUserNameW 34877->34882 34878 17b11ea 34878->34852 34879 17b10df 34879->34878 34883 17bf638 GetUserNameW 34879->34883 34884 17bf628 GetUserNameW 34879->34884 34885 17b11ef 2 API calls 34879->34885 34886 17bf96b GetUserNameW 34879->34886 34887 17bf970 GetUserNameW 34879->34887 34880->34852 34881->34879 34882->34879 34883->34879 34884->34879 34885->34879 34886->34879 34887->34879 34890 6cf7dad 34888->34890 34889 6cf7ff8 34889->34865 34890->34889 34891 6cf839d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34891 34892 6cf835d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34892 34893 6cf83a5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34893 34894 6cf8365 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34894 34895 6cf838d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34895 34896 6cf83c9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34896 34897 6cf8389 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34897 34898 6cf83c5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34898 34899 6cf8385 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34899 34900 6cf83c1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34900 34901 6cf8381 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34901 34902 6cf83ed GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34902 34903 6cf83ad GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34903 34904 6cf836d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34904 34905 6cf83e9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34905 34906 6cf83a9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34906 34907 6cf8369 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34907 34908 6cf8428 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34908 34909 6cf83f5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34909 34910 6cf83b5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34910 34911 6cf8375 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34911 34912 6cf83f1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34912 34913 6cf83b1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34913 34914 6cf8371 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34914 34915 6cf83cd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34915 34916 6cf8399 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34916 34917 6cf8359 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34917 34918 6cf8418 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34918 34919 6cf83d5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34919 34920 6cf8395 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34920 34921 6cf83d1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34921 34922 6cf8391 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34922 34923 6cf83a1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34923 34924 6cf8361 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34924 34925 6cf83bd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34925 34926 6cf837d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34926 34927 6cf83f9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34927 34928 6cf83b9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34928 34929 6cf8379 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34890->34929 34891->34890 34892->34890 34893->34890 34894->34890 34895->34890 34896->34890 34897->34890 34898->34890 34899->34890 34900->34890 34901->34890 34902->34890 34903->34890 34904->34890 34905->34890 34906->34890 34907->34890 34908->34890 34909->34890 34910->34890 34911->34890 34912->34890 34913->34890 34914->34890 34915->34890 34916->34890 34917->34890 34918->34890 34919->34890 34920->34890 34921->34890 34922->34890 34923->34890 34924->34890 34925->34890 34926->34890 34927->34890 34928->34890 34929->34890 34931 6cf7dad 34930->34931 34932 6cf7ff8 34931->34932 34933 6cf83c5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34933 34934 6cf8385 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34934 34935 6cf83e9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34935 34936 6cf83a9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34936 34937 6cf83f1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34937 34938 6cf83b1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34938 34939 6cf83cd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34939 34940 6cf838d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34940 34941 6cf83c9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34941 34942 6cf8389 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34942 34943 6cf83d5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34943 34944 6cf8395 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34944 34945 6cf83d1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34945 34946 6cf8391 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34946 34947 6cf83ed GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34947 34948 6cf83ad GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34948 34949 6cf836d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34949 34950 6cf837d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34950 34951 6cf83f9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34951 34952 6cf83b9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34952 34953 6cf8379 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34953 34954 6cf83f5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34954 34955 6cf83b5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34955 34956 6cf8375 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34956 34957 6cf83c1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34957 34958 6cf8381 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34958 34959 6cf839d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34959 34960 6cf835d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34960 34961 6cf8399 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34961 34962 6cf8359 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34962 34963 6cf8418 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34963 34964 6cf8369 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34964 34965 6cf8428 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34965 34966 6cf83a5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34966 34967 6cf8365 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34967 34968 6cf83a1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34968 34969 6cf8361 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34969 34970 6cf83bd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34970 34971 6cf8371 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 34931->34971 34932->34865 34933->34931 34934->34931 34935->34931 34936->34931 34937->34931 34938->34931 34939->34931 34940->34931 34941->34931 34942->34931 34943->34931 34944->34931 34945->34931 34946->34931 34947->34931 34948->34931 34949->34931 34950->34931 34951->34931 34952->34931 34953->34931 34954->34931 34955->34931 34956->34931 34957->34931 34958->34931 34959->34931 34960->34931 34961->34931 34962->34931 34963->34931 34964->34931 34965->34931 34966->34931 34967->34931 34968->34931 34969->34931 34970->34931 34971->34931 34973 17bf639 34972->34973 34976 17bf6af 34973->34976 34992 17bf1dc 34973->34992 34976->34869 34978 17bf634 34977->34978 34979 17bf1dc GetUserNameW 34978->34979 34981 17bf6af 34978->34981 34980 17bf6a1 34979->34980 34980->34869 34981->34869 34983 17bf988 34982->34983 34986 17bf9e6 34983->34986 34996 17bf1f4 GetUserNameW 34983->34996 34988 17bf970 34987->34988 34991 17bf9e6 34988->34991 34997 17bf1f4 GetUserNameW 34988->34997 34994 17bf770 GetUserNameW 34992->34994 34995 17bf8bd 34994->34995 34998 17b5b90 34999 17b5b91 34998->34999 35002 17b5adc 34999->35002 35001 17b5be5 35004 17b76b0 LoadLibraryA 35002->35004 35005 17b77a9 35004->35005
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67eca97ab9c95ff687018edc71abc73d310ab7a00b0ff27f438cc48c46839a04
                                  • Instruction ID: 570cbdf0d5c6a7c2c92873ad24a3b9fd8c2ee69a4548a535576b61fe010d4e9f
                                  • Opcode Fuzzy Hash: 67eca97ab9c95ff687018edc71abc73d310ab7a00b0ff27f438cc48c46839a04
                                  • Instruction Fuzzy Hash: 0A131731D10B1A8ACB50EF68C894599F7B1FF99310F11D79AE459B7221EB70AAC4CF81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f882b7cdb6ba10678a50804ea500e07d84d9fed31011dc9ed28d8f99948153c4
                                  • Instruction ID: 28f0658029619bd6e8dccd6b8d5c9a87009d3abccde667b91dc5ef5029992492
                                  • Opcode Fuzzy Hash: f882b7cdb6ba10678a50804ea500e07d84d9fed31011dc9ed28d8f99948153c4
                                  • Instruction Fuzzy Hash: B1E21631D10B1A8ECB50EF68C894699F7B1FF99310F11D69AE059B7221EB70AAD4CF41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b6d1ab62321bb0012362937659e9003ce81146169080402daef1defba3ff4e4
                                  • Instruction ID: 1457be392817370a5e898a9e11c124841e87fc3e0a71a0a3e83025f222526e79
                                  • Opcode Fuzzy Hash: 0b6d1ab62321bb0012362937659e9003ce81146169080402daef1defba3ff4e4
                                  • Instruction Fuzzy Hash: 33423431E10619CFCB54EBB5C8546DEB7B2AFD9300F50865ED409AB254EF70AE85CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 993b0e7b91e68d906a3992bf61ac8742d752bdb6b82a235ef60bd940c2c71d1c
                                  • Instruction ID: 0d3c1623e2be1aa0775295ec47393e46ad626ffafb8c306aecf43ff4143035fb
                                  • Opcode Fuzzy Hash: 993b0e7b91e68d906a3992bf61ac8742d752bdb6b82a235ef60bd940c2c71d1c
                                  • Instruction Fuzzy Hash: 4E027930F042159FDB54EBA9C4546AEB7E3AF84320F24846DE526DB794DB34EE42CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 415 17bf764-17bf7cf 417 17bf83a-17bf83e 415->417 418 17bf7d1-17bf7fc 415->418 419 17bf869-17bf874 417->419 420 17bf840-17bf863 417->420 424 17bf7fe-17bf800 418->424 425 17bf82c 418->425 422 17bf880-17bf8bb GetUserNameW 419->422 423 17bf876-17bf87e 419->423 420->419 426 17bf8bd-17bf8c3 422->426 427 17bf8c4-17bf8da 422->427 423->422 430 17bf822-17bf82a 424->430 431 17bf802-17bf80c 424->431 429 17bf831-17bf834 425->429 426->427 432 17bf8dc-17bf8e8 427->432 433 17bf8f0-17bf917 427->433 429->417 430->429 434 17bf80e 431->434 435 17bf810-17bf81e 431->435 432->433 441 17bf919-17bf91d 433->441 442 17bf927 433->442 434->435 435->435 439 17bf820 435->439 439->430 441->442 443 17bf91f 441->443 444 17bf928 442->444 443->442 444->444
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 017BF8AB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.429521874.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_17b0000_ggh.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: 9ed0d08109b527a15e98c796d98e9e86b09b37047ab681a3e5ff50aaa9b19762
                                  • Instruction ID: 58649b126d104638dbce758a8711e4bc10247a2ce3e10de598830df1d31e48ea
                                  • Opcode Fuzzy Hash: 9ed0d08109b527a15e98c796d98e9e86b09b37047ab681a3e5ff50aaa9b19762
                                  • Instruction Fuzzy Hash: 4C5102B0E002289FDB18CFA9C885BDDFBB1BF48714F15812AE819AB351D774A845CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 445 17bf1dc-17bf7cf 447 17bf83a-17bf83e 445->447 448 17bf7d1-17bf7fc 445->448 449 17bf869-17bf874 447->449 450 17bf840-17bf863 447->450 454 17bf7fe-17bf800 448->454 455 17bf82c 448->455 452 17bf880-17bf8bb GetUserNameW 449->452 453 17bf876-17bf87e 449->453 450->449 456 17bf8bd-17bf8c3 452->456 457 17bf8c4-17bf8da 452->457 453->452 460 17bf822-17bf82a 454->460 461 17bf802-17bf80c 454->461 459 17bf831-17bf834 455->459 456->457 462 17bf8dc-17bf8e8 457->462 463 17bf8f0-17bf917 457->463 459->447 460->459 464 17bf80e 461->464 465 17bf810-17bf81e 461->465 462->463 471 17bf919-17bf91d 463->471 472 17bf927 463->472 464->465 465->465 469 17bf820 465->469 469->460 471->472 473 17bf91f 471->473 474 17bf928 472->474 473->472 474->474
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 017BF8AB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.429521874.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_17b0000_ggh.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: e92861ea16e8a0a0ea3ff1faaf3c4885c8733b6b04ef144589e3cce8271dc0f2
                                  • Instruction ID: 944d4e19899708c7ed522a12fa7c3e46767608aae6695bf7ea0855500b274e19
                                  • Opcode Fuzzy Hash: e92861ea16e8a0a0ea3ff1faaf3c4885c8733b6b04ef144589e3cce8271dc0f2
                                  • Instruction Fuzzy Hash: C5510270E002288FDB18CFA9C885BDDFBB1BF48714F158169E819BB351D774A845CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 475 17bf1f4-17bf7cf 477 17bf83a-17bf83e 475->477 478 17bf7d1-17bf7fc 475->478 479 17bf869-17bf874 477->479 480 17bf840-17bf863 477->480 484 17bf7fe-17bf800 478->484 485 17bf82c 478->485 482 17bf880-17bf8bb GetUserNameW 479->482 483 17bf876-17bf87e 479->483 480->479 486 17bf8bd-17bf8c3 482->486 487 17bf8c4-17bf8da 482->487 483->482 490 17bf822-17bf82a 484->490 491 17bf802-17bf80c 484->491 489 17bf831-17bf834 485->489 486->487 492 17bf8dc-17bf8e8 487->492 493 17bf8f0-17bf917 487->493 489->477 490->489 494 17bf80e 491->494 495 17bf810-17bf81e 491->495 492->493 501 17bf919-17bf91d 493->501 502 17bf927 493->502 494->495 495->495 499 17bf820 495->499 499->490 501->502 503 17bf91f 501->503 504 17bf928 502->504 503->502 504->504
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 017BF8AB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.429521874.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_17b0000_ggh.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: 802ead23cb9dccf4519669a6757f9e4c3b2e7e56a6971173daf3c79d97b3f48a
                                  • Instruction ID: 26ebfcc9c81627bd77ebb072bea6ac1cc16483f97ed57b24e4fe60761c31d364
                                  • Opcode Fuzzy Hash: 802ead23cb9dccf4519669a6757f9e4c3b2e7e56a6971173daf3c79d97b3f48a
                                  • Instruction Fuzzy Hash: C5510270E002288FDB18CFA9C885BDDFBB1BF48714F148129E819BB351D774A845CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 505 6cf9eb8-6cf9ec3 506 6cf9eed-6cf9f0c call 6cf8a28 505->506 507 6cf9ec5-6cf9eec call 6cf3c70 505->507 513 6cf9f0e-6cf9f11 506->513 514 6cf9f12-6cf9f71 506->514 521 6cf9f77-6cfa004 GlobalMemoryStatusEx 514->521 522 6cf9f73-6cf9f76 514->522 526 6cfa00d-6cfa035 521->526 527 6cfa006-6cfa00c 521->527 527->526
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433527591.0000000006CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cf0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bde4519528c59ee2df87da95a81507a66e457fc4aed0e68f87989fbacb2d16b8
                                  • Instruction ID: 2fcfdd37adf04ddbed2eaa8d28236f9967065db8f0a3f32f931fd80c573e3c84
                                  • Opcode Fuzzy Hash: bde4519528c59ee2df87da95a81507a66e457fc4aed0e68f87989fbacb2d16b8
                                  • Instruction Fuzzy Hash: D7412172E1035A9FCB50CFA9D8002EEBBF4AF89310F14856AE445E7240DB749885CBE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 530 17b76a4-17b76a8 531 17b76aa 530->531 532 17b76e2-17b7707 530->532 533 17b76ac 531->533 534 17b76b1 531->534 535 17b775b-17b77a7 LoadLibraryA 532->535 536 17b7709-17b772e 532->536 537 17b76ae-17b76b0 533->537 538 17b76b2-17b76df 533->538 534->538 543 17b77a9-17b77af 535->543 544 17b77b0-17b77e1 535->544 536->535 542 17b7730-17b7732 536->542 537->534 538->532 545 17b7755-17b7758 542->545 546 17b7734-17b773e 542->546 543->544 551 17b77e3-17b77e7 544->551 552 17b77f1 544->552 545->535 548 17b7742-17b7751 546->548 549 17b7740 546->549 548->548 553 17b7753 548->553 549->548 551->552 554 17b77e9 551->554 555 17b77f2 552->555 553->545 554->552 555->555
                                  APIs
                                  • LoadLibraryA.KERNELBASE(?), ref: 017B7797
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.429521874.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_17b0000_ggh.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 52a0443157a28affbcf606a63546bc13946593be06121ffc27f55768840851b1
                                  • Instruction ID: c4e290545c3977e20b3d6fe4862ff32a9a388d8c04bb92ca79d64a717c3ea364
                                  • Opcode Fuzzy Hash: 52a0443157a28affbcf606a63546bc13946593be06121ffc27f55768840851b1
                                  • Instruction Fuzzy Hash: A64147B0D002599FDB18CFA9C885BDEFBF1BB88314F148529E855AB390D774A481CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 556 17b5adc-17b7707 561 17b775b-17b77a7 LoadLibraryA 556->561 562 17b7709-17b772e 556->562 566 17b77a9-17b77af 561->566 567 17b77b0-17b77e1 561->567 562->561 565 17b7730-17b7732 562->565 568 17b7755-17b7758 565->568 569 17b7734-17b773e 565->569 566->567 574 17b77e3-17b77e7 567->574 575 17b77f1 567->575 568->561 571 17b7742-17b7751 569->571 572 17b7740 569->572 571->571 576 17b7753 571->576 572->571 574->575 577 17b77e9 574->577 578 17b77f2 575->578 576->568 577->575 578->578
                                  APIs
                                  • LoadLibraryA.KERNELBASE(?), ref: 017B7797
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.429521874.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_17b0000_ggh.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 8665d9295eb6a574d0a16102cc2508a46d5c8fc8304828876a926ef423d412b5
                                  • Instruction ID: 0840e60a9af02115268b957c3a0003ae769aeb6d98e6620457e7aaba06c1360d
                                  • Opcode Fuzzy Hash: 8665d9295eb6a574d0a16102cc2508a46d5c8fc8304828876a926ef423d412b5
                                  • Instruction Fuzzy Hash: D34124B0E002498FDB14CFA9C9857DEFBF1EB88714F148129E815AB280D774A841CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1201 6cccaf1-6cccafc 1202 6cccafe-6cccb01 1201->1202 1203 6cccb19-6cccb1c 1202->1203 1204 6cccb03-6cccb16 1202->1204 1205 6cccb1e-6cccb25 1203->1205 1206 6cccb2a-6cccb2d 1203->1206 1205->1206 1208 6cccb4d-6cccb50 1206->1208 1209 6cccb2f-6cccb46 1206->1209 1210 6cccb5e-6cccb61 1208->1210 1211 6cccb52-6cccb59 1208->1211 1209->1205 1222 6cccb48 1209->1222 1213 6cccb81-6cccb84 1210->1213 1214 6cccb63-6cccb7a 1210->1214 1211->1210 1215 6cccba8-6cccbab 1213->1215 1216 6cccb86-6cccb9d 1213->1216 1214->1204 1228 6cccb7c 1214->1228 1219 6cccbdd-6cccd81 1215->1219 1220 6cccbad-6cccbb0 1215->1220 1216->1205 1234 6cccba3 1216->1234 1267 6cccebd-6ccced0 1219->1267 1268 6cccd87-6cccd8e 1219->1268 1223 6cccbd4-6cccbd7 1220->1223 1224 6cccbb2-6cccbc9 1220->1224 1222->1208 1223->1219 1226 6ccced3-6ccced6 1223->1226 1224->1205 1240 6cccbcf 1224->1240 1229 6ccced8-6ccceef 1226->1229 1230 6cccefa-6cccefd 1226->1230 1228->1213 1229->1224 1246 6cccef5 1229->1246 1230->1219 1235 6cccf03-6cccf06 1230->1235 1234->1215 1238 6cccf08-6cccf0d 1235->1238 1239 6cccf10-6cccf12 1235->1239 1238->1239 1242 6cccf19-6cccf1c 1239->1242 1243 6cccf14 1239->1243 1240->1223 1242->1202 1244 6cccf22-6cccf2b 1242->1244 1243->1242 1246->1230 1269 6ccce48-6ccce4f 1268->1269 1270 6cccd94-6cccdb7 1268->1270 1269->1267 1271 6ccce51-6ccce84 1269->1271 1279 6cccdbf-6cccdc7 1270->1279 1283 6ccce89-6ccceb6 1271->1283 1284 6ccce86 1271->1284 1281 6cccdcc-6ccce13 1279->1281 1282 6cccdc9 1279->1282 1293 6ccce2b-6ccce3c 1281->1293 1294 6ccce15-6ccce26 1281->1294 1282->1281 1283->1244 1283->1267 1284->1283 1293->1244 1294->1244
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-3993045852
                                  • Opcode ID: 624d20e4b7b1b5bf3a4ac1f25691c67a9823a0d387a8cd638d177d1b9409f9da
                                  • Instruction ID: 7f4e35c927af46948eb9e9824002364e0f043347e3ca5fd5ea52ad8022513c4d
                                  • Opcode Fuzzy Hash: 624d20e4b7b1b5bf3a4ac1f25691c67a9823a0d387a8cd638d177d1b9409f9da
                                  • Instruction Fuzzy Hash: A5C14B31F102198FEB54DBA4C4546AEB7B2EF98320F20416DE40AEB354DB75EE46CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1297 6cf9f88-6cf9fce 1299 6cf9fd6-6cfa004 GlobalMemoryStatusEx 1297->1299 1300 6cfa00d-6cfa035 1299->1300 1301 6cfa006-6cfa00c 1299->1301 1301->1300
                                  APIs
                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06CF9F0A), ref: 06CF9FF7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433527591.0000000006CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cf0000_ggh.jbxd
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID:
                                  • API String ID: 1890195054-0
                                  • Opcode ID: d0e0c71bb8ec77d09a41dda6484906b525f9b841e7ac13005f04df84425ba9b7
                                  • Instruction ID: 5f921a65c8b98b85c19b970fffa6fa507349f7146d56ce2281a47d2124dc56ab
                                  • Opcode Fuzzy Hash: d0e0c71bb8ec77d09a41dda6484906b525f9b841e7ac13005f04df84425ba9b7
                                  • Instruction Fuzzy Hash: 801133B1C0061A9FCB50CF9AD844BDEFBB4BF48320F10812AE458B7240D378A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1304 6cf8a28-6cfa004 GlobalMemoryStatusEx 1307 6cfa00d-6cfa035 1304->1307 1308 6cfa006-6cfa00c 1304->1308 1308->1307
                                  APIs
                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06CF9F0A), ref: 06CF9FF7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433527591.0000000006CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CF0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cf0000_ggh.jbxd
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID:
                                  • API String ID: 1890195054-0
                                  • Opcode ID: c19da7d240daff8ff327f6f8abe14ee35592650c9cfd49945e4781c1cbd769fb
                                  • Instruction ID: e29fe5f02c1a94c9611fb37cc8f1947889ff5579273d5aae81d88965034782e2
                                  • Opcode Fuzzy Hash: c19da7d240daff8ff327f6f8abe14ee35592650c9cfd49945e4781c1cbd769fb
                                  • Instruction Fuzzy Hash: 441122B1C006599FCB50CF9AD8447DEFBB4AB48320F14816AE518B7200D378A940CFE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2205 6cc953d-6cc9548 2206 6cc954a 2205->2206 2207 6cc9517-6cc9528 2205->2207 2209 6cc954c-6cc954e 2206->2209 2210 6cc9551-6cc956b 2206->2210 2214 6cc9529 2207->2214 2209->2210 2211 6cc956d-6cc9570 2210->2211 2212 6cc9572-6cc958e 2211->2212 2213 6cc9593-6cc9595 2211->2213 2212->2213 2215 6cc959c-6cc959f 2213->2215 2216 6cc9597 2213->2216 2214->2214 2215->2211 2218 6cc95a1-6cc95d3 2215->2218 2216->2215 2225 6cc95da-6cc9608 2218->2225 2230 6cc960e-6cc9618 2225->2230 2231 6cc968a-6cc96ae 2225->2231 2234 6cc961a-6cc9620 2230->2234 2235 6cc9630-6cc9688 2230->2235 2239 6cc96b8 2231->2239 2240 6cc96b0 2231->2240 2237 6cc9624-6cc9626 2234->2237 2238 6cc9622 2234->2238 2235->2230 2235->2231 2237->2235 2238->2235 2242 6cc96b9 2239->2242 2240->2239 2242->2242
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: P@Gp
                                  • API String ID: 0-1978594688
                                  • Opcode ID: ec5177e04abc4cde1d945ecc2f3b6a51ddb59c917cf47c57a380a984ef240dad
                                  • Instruction ID: fc8b2afae526a048e2b27c2deee44ace7c159a88b24af63afd8d6eced30a9da9
                                  • Opcode Fuzzy Hash: ec5177e04abc4cde1d945ecc2f3b6a51ddb59c917cf47c57a380a984ef240dad
                                  • Instruction Fuzzy Hash: 6D411270B042019FDB94AB38842426E7BE3AF99610F15487DE006DB391DF34DD06CBE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2249 6cc9550-6cc956b 2251 6cc956d-6cc9570 2249->2251 2252 6cc9572-6cc958e 2251->2252 2253 6cc9593-6cc9595 2251->2253 2252->2253 2254 6cc959c-6cc959f 2253->2254 2255 6cc9597 2253->2255 2254->2251 2257 6cc95a1-6cc95d3 2254->2257 2255->2254 2264 6cc95da-6cc9608 2257->2264 2269 6cc960e-6cc9618 2264->2269 2270 6cc968a-6cc96ae 2264->2270 2273 6cc961a-6cc9620 2269->2273 2274 6cc9630-6cc9688 2269->2274 2278 6cc96b8 2270->2278 2279 6cc96b0 2270->2279 2276 6cc9624-6cc9626 2273->2276 2277 6cc9622 2273->2277 2274->2269 2274->2270 2276->2274 2277->2274 2281 6cc96b9 2278->2281 2279->2278 2281->2281
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: P@Gp
                                  • API String ID: 0-1978594688
                                  • Opcode ID: f0e0cf8fff5beb805301785bb14e54a3d97c13affaa778ccf685c54f59fd7902
                                  • Instruction ID: 67972f56e95046ec2d1489dbee01f1981a4d3ab75297f51f7d1f26d5ca8ce650
                                  • Opcode Fuzzy Hash: f0e0cf8fff5beb805301785bb14e54a3d97c13affaa778ccf685c54f59fd7902
                                  • Instruction Fuzzy Hash: C231BC70B042019FEB94AB75842466F76E3AF88610F25882DE006DB394EF35DD02CBE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f85b566fb80789e63259483811ec9b0b1383382e7954b825c78443969343d2a
                                  • Instruction ID: 093569ea51c282f247d90f9d9af4c32152116a2fe774ebfd191e0cdbcecc26f8
                                  • Opcode Fuzzy Hash: 3f85b566fb80789e63259483811ec9b0b1383382e7954b825c78443969343d2a
                                  • Instruction Fuzzy Hash: 8B327BB4B11111DBDB98AB78C05426E72B7EBD9390F64082DE106CB394DF35CE429BE6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7226735ddf0b6834538ab2367484a320e970c80128f95beb8710cc7b92465fe3
                                  • Instruction ID: 817e7615e5c32ddf7a0490f1827702a9e8f61ae4cb0aa026c225558e6d4c2ea0
                                  • Opcode Fuzzy Hash: 7226735ddf0b6834538ab2367484a320e970c80128f95beb8710cc7b92465fe3
                                  • Instruction Fuzzy Hash: A9228E30F102159FDBA4EB68C5947AEB7F2AF89260F14846DE406DB390DB35EE41CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa88b6413221153eff45833564a4bea0bd0f0019e2ed82dedacbb3c9a11ffe07
                                  • Instruction ID: b8e325eba0735d7b3f2f88a044b30ed3ab1a34b7783ccb20e85a9bbd23273d87
                                  • Opcode Fuzzy Hash: aa88b6413221153eff45833564a4bea0bd0f0019e2ed82dedacbb3c9a11ffe07
                                  • Instruction Fuzzy Hash: 0DF13C30B042198FDB94EBB9C4547AEB7B2AF89310F20842DD41AAB395DF75ED41CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd683a84931429d0393863219338756f63a14f45ef81bc65dceabb0b6526331b
                                  • Instruction ID: 44d7a35fbbf69bfbd87f82543342355331aa7dda4b0dd5a9c2be3cbeaccdde1b
                                  • Opcode Fuzzy Hash: cd683a84931429d0393863219338756f63a14f45ef81bc65dceabb0b6526331b
                                  • Instruction Fuzzy Hash: 22E18F30F142459FDB54DB68E8946AEBBB2EF89320F14842DE50ADB390DB35DD42CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 309af6b216b0a435c020ea8f95386f31d95d880666da57495c6bd16214144070
                                  • Instruction ID: 208ff87952a371ff21f2d540b9537dca151356b1aba882b46c71f733550d6a3c
                                  • Opcode Fuzzy Hash: 309af6b216b0a435c020ea8f95386f31d95d880666da57495c6bd16214144070
                                  • Instruction Fuzzy Hash: E7D16F70B002159FEB54DBA9C854B6EB7B2BF99710F20806DE50AEB3A4DF759C41CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd4c6cd82b26f6da00455044d6d4e158252dc1830da353a5f6150770294a83b4
                                  • Instruction ID: f3a2e09a11fb78fd1ed215e3687eb58d786b177cb81bd2bdefc6d8d559041a50
                                  • Opcode Fuzzy Hash: cd4c6cd82b26f6da00455044d6d4e158252dc1830da353a5f6150770294a83b4
                                  • Instruction Fuzzy Hash: E291DF32E041158FDF70CB68C484BAEFBA1EB86320F15896ED4AEDB281D635DA41C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8059fe90c5e9e3d36f967519b6f495dab9a787fee7026cb20cdbfa8a74e2245
                                  • Instruction ID: e8e4a5a136221a9aa99a3fd20d556fede763fbab6ff592d0cd5fe8829626797c
                                  • Opcode Fuzzy Hash: a8059fe90c5e9e3d36f967519b6f495dab9a787fee7026cb20cdbfa8a74e2245
                                  • Instruction Fuzzy Hash: 6C918F35B102549FDB54DB68E898AADB7F2EF88320F14842DE40AE7350DB31DD42CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0794d9fe24832378e7474f15bc6742bcf4883d5983a59791e4069c0d16390849
                                  • Instruction ID: 5e84d94f9f14735ba4becc765202401b08ee65d75854587b9f8774dd35d2e03b
                                  • Opcode Fuzzy Hash: 0794d9fe24832378e7474f15bc6742bcf4883d5983a59791e4069c0d16390849
                                  • Instruction Fuzzy Hash: BB915D70F006059FDB54DBA9C4967AEB7F2AF98310F10852DE50AEB344EE34ED428B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 555f6014c7f59898c2af3443195aea869717c3f4eaf35ac1563713e5c3f4c866
                                  • Instruction ID: 580e79ee2288eb43af04de1c343122ab11b8df83bde2564af8f30879abba221a
                                  • Opcode Fuzzy Hash: 555f6014c7f59898c2af3443195aea869717c3f4eaf35ac1563713e5c3f4c866
                                  • Instruction Fuzzy Hash: DC812C70F106059FDB54DBA9C4957AEB7E2AF88350F10852DE50AEB384EE34ED428B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9978f7f3ff091fa073032b1c9965a91addb796afb9f664426094c7b76cf3bb8f
                                  • Instruction ID: 422f4e63e35a11c2f70a69a6fbfa73c66548876471aa9891af8865396f885714
                                  • Opcode Fuzzy Hash: 9978f7f3ff091fa073032b1c9965a91addb796afb9f664426094c7b76cf3bb8f
                                  • Instruction Fuzzy Hash: 2F61D371F104214BEB609B6D885066FB2EB9FD4620B25443EE90FDB360EF69ED0287D5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7837447c8b5a32e21ae21f3d90a0ff5fe6cb83e7a26dab7f562244f01697cd73
                                  • Instruction ID: 99b0de793e7312660376929a1fa2c6294924e35f5a735b7dff64b5da416bae4a
                                  • Opcode Fuzzy Hash: 7837447c8b5a32e21ae21f3d90a0ff5fe6cb83e7a26dab7f562244f01697cd73
                                  • Instruction Fuzzy Hash: D2815E70B002159FDB54DBA9C854BAEBBF6BF98700F20406DE50AEB3A4DF759C418B80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af94a6a537604e3588969497fdac7e68031b7dc026aa3ee03526a51f75b5de8d
                                  • Instruction ID: ee27ebd1ced7bfce8792ae6d1b1d6af77e645783ad8e48ed52824ee9bceea088
                                  • Opcode Fuzzy Hash: af94a6a537604e3588969497fdac7e68031b7dc026aa3ee03526a51f75b5de8d
                                  • Instruction Fuzzy Hash: 99914F30E1021A8FDF60DFA8C850B9DB7B1FF95310F20859AD549AB251EB75AE85CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89710041025ee83f38857879c4a8efbeefaf19cf9018593528a12c0d9550af93
                                  • Instruction ID: d5af4ed429e38f2eb0a2cc99ca1d36a0d0ee7c48c342f527ea63bd342fda3ab3
                                  • Opcode Fuzzy Hash: 89710041025ee83f38857879c4a8efbeefaf19cf9018593528a12c0d9550af93
                                  • Instruction Fuzzy Hash: 0B912E30E1021ACBDF60DFA8C850B9DB7B1FF99310F208599D549AB255DB71AE85CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b9aee88b208af112fef44fb3332193a16d2c8cf1ca4eafbcab07c56d3bd375a4
                                  • Instruction ID: d5aa20f69061fe88ae022c892ce2be16435af7c161eadc6df0fb7068e6c7e77a
                                  • Opcode Fuzzy Hash: b9aee88b208af112fef44fb3332193a16d2c8cf1ca4eafbcab07c56d3bd375a4
                                  • Instruction Fuzzy Hash: AB619F76A007058FDB60CFA9C880AAEBBB1FF49320F10496ED19AD7661D330E945DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d5f9362f736e15435fe7739eca8920067af2c063f6a9c7b92ec28a0134b5db6
                                  • Instruction ID: a7f8dc9e736848a1e1fb5e229d900f50f19897329ba2e9c182e3adde77862130
                                  • Opcode Fuzzy Hash: 0d5f9362f736e15435fe7739eca8920067af2c063f6a9c7b92ec28a0134b5db6
                                  • Instruction Fuzzy Hash: 19616D70E102598FDB58EFA8D5547AEBBB2BF89310F60442DE406AB394DB74ED41CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7728d2cbf425dd13ff6e835ed990525e2abd6e64c02bed016980a0a2de80b4cf
                                  • Instruction ID: 71f15623c0419c79cb8244fbc11cb1c87ec7223afbaef04c465888862bb371a6
                                  • Opcode Fuzzy Hash: 7728d2cbf425dd13ff6e835ed990525e2abd6e64c02bed016980a0a2de80b4cf
                                  • Instruction Fuzzy Hash: 0F518474F002199FEF54ABA9C4157AEB6BAFB98710F10442EE106EB394DE748D01CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 626c7d25bab59e3e20b12333b698845d71d8fbe4855fb2e42b9b2afca325c128
                                  • Instruction ID: 336bae676dd7bb9c917fd92fbb842d20e6627da3cbbe3432dc2cc4c8ac4d9859
                                  • Opcode Fuzzy Hash: 626c7d25bab59e3e20b12333b698845d71d8fbe4855fb2e42b9b2afca325c128
                                  • Instruction Fuzzy Hash: BD51B970F141868FDFA5DB68E48076EB762EB85224F20882DE50EDB341DB39DE45C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 32fc1741b9220ffbc1684b410d95a13d035fda8aa6da1aa9eafafb7d2306403f
                                  • Instruction ID: 7a4a71b5ef18ed3fbdf103d5c8aac6a4344b1cb4aef9c01a9d539f3cf0deadd3
                                  • Opcode Fuzzy Hash: 32fc1741b9220ffbc1684b410d95a13d035fda8aa6da1aa9eafafb7d2306403f
                                  • Instruction Fuzzy Hash: B3515871A00204CFDB44DF69E880699FBB1FF88320F14C1AEE9099B356E7759945CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cd5fb1e4d4da96e8b8dd8b318316d3dfdee30194d3e9ca378e56785f5373d33
                                  • Instruction ID: f1e50d33770898835e51b9f51e615edba8e369716c64abe2084cf4521e104dbd
                                  • Opcode Fuzzy Hash: 6cd5fb1e4d4da96e8b8dd8b318316d3dfdee30194d3e9ca378e56785f5373d33
                                  • Instruction Fuzzy Hash: 0441C530F002199FEF54ABA984157AEBAE7FB94710F10842DE106EB394DE749D01CBD1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e3a69f84934c660db99749be815bbb407f0632c51a77deeb53016f307ece7e4f
                                  • Instruction ID: 9d85ef9f6a4b9f8d72392d8dd179c06f8ae049fd606dfd907848b374846fe89c
                                  • Opcode Fuzzy Hash: e3a69f84934c660db99749be815bbb407f0632c51a77deeb53016f307ece7e4f
                                  • Instruction Fuzzy Hash: 9C419870F141818FDFA5DB68E49036EBB65EB85220F10882DE50EDB341DA39DE4587D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da1f60180207ff437acbdc69259077f20491c1094f34729af0d09927ec5de467
                                  • Instruction ID: 80a6cf8dbf4434a9a61ddfe17d11acb987947935cbf428c99bbfcdb80ad1b378
                                  • Opcode Fuzzy Hash: da1f60180207ff437acbdc69259077f20491c1094f34729af0d09927ec5de467
                                  • Instruction Fuzzy Hash: A5317375B00615EFD714DB68C890E3EB7A6BBC8710F54C068E9468B399CB35E842CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e5dc94fa5460baab6984976dc1b66d63cf7cd809ef688b2667f2c7b3ecd6192e
                                  • Instruction ID: 696c985dcd5dd8daf55d7071a744a23314506b76fecd914c798c1f954d7aa252
                                  • Opcode Fuzzy Hash: e5dc94fa5460baab6984976dc1b66d63cf7cd809ef688b2667f2c7b3ecd6192e
                                  • Instruction Fuzzy Hash: E4318370F10219DFDB54DFA5D44479EB7B2EF45320F10842EE906E7240EB76A945CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc46d8d9464103b67f976c0b7cf4349b98d7dd296041927c03994732b4661803
                                  • Instruction ID: c3a285f3fa993105a8a4eafa6b663eca2755f8ac26c1d23121398d074eaa937d
                                  • Opcode Fuzzy Hash: fc46d8d9464103b67f976c0b7cf4349b98d7dd296041927c03994732b4661803
                                  • Instruction Fuzzy Hash: 90313930E102199BCB54CFA9D89469EB7B6FF88310F10892DE856E7340DB71ED42CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ee864b487b36ec355f3f2062f001475822be135bfaccc125239e080cf474d74
                                  • Instruction ID: 1716f5c8c730c39682510f1fad3372b4d2bfaaf557158952af035aee0473f2ad
                                  • Opcode Fuzzy Hash: 9ee864b487b36ec355f3f2062f001475822be135bfaccc125239e080cf474d74
                                  • Instruction Fuzzy Hash: 8331A170E102599FDB95CF69D84069EF7B2FF89310F14851EE845EB340DB74AA82CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8129eab81eb69138266eb295b2023d1748352060f301854a8d7faca80450678b
                                  • Instruction ID: f04ef3c189b4e805d935c3c5ef18588308f12f6f7dfd35f95601e07f185addf8
                                  • Opcode Fuzzy Hash: 8129eab81eb69138266eb295b2023d1748352060f301854a8d7faca80450678b
                                  • Instruction Fuzzy Hash: D931F631A042908FEB55DB78D854BAE7FF5AF49720F1481AEE405EB3A1DA74CD04CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b7c8902a954bc24eba1409d253543c5e84169f117bbe88534dfa66b26148481
                                  • Instruction ID: 8b0b2ae8e6cbc82efff7e5965a5727a9b84a6258f11d0690b8e21a5497e4c939
                                  • Opcode Fuzzy Hash: 6b7c8902a954bc24eba1409d253543c5e84169f117bbe88534dfa66b26148481
                                  • Instruction Fuzzy Hash: F931D271F402559FDB90EFB985917EEB7F59B48220F14802DE919E7380EA39DE418BE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2470bb6aaa5c63472e10f3d9fd8cc127e9f4c4d67e1e8006e2858cc744a11672
                                  • Instruction ID: 8ec8088686a2002e08dca7769811e460c2392293dcf2c48539eceba2b8726354
                                  • Opcode Fuzzy Hash: 2470bb6aaa5c63472e10f3d9fd8cc127e9f4c4d67e1e8006e2858cc744a11672
                                  • Instruction Fuzzy Hash: F4313A30E102159FCB54CF69D45469EB7B6BF89310F10852DE856E7350DB70ED42CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f2d2170336e107a1a2926814d618c59f6875c4e404c8df79609f8dbe986e626
                                  • Instruction ID: f900d6f5befcc907029aedbfd355e1072fd5eacbce249fce0f4e1082198b96ee
                                  • Opcode Fuzzy Hash: 7f2d2170336e107a1a2926814d618c59f6875c4e404c8df79609f8dbe986e626
                                  • Instruction Fuzzy Hash: DC319171F402159FDB50EBB985517EEB6F1AB48210F54802DE519EB380EB35DE018BE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa3ff9df33e88d19d5f8a6d1908086fb9149c58f756ed08b0957fdbfbd16e908
                                  • Instruction ID: 7abb2405442cc0f2a43587ba840c50e760ea3e6c3fbd295e96f23408637be2fe
                                  • Opcode Fuzzy Hash: fa3ff9df33e88d19d5f8a6d1908086fb9149c58f756ed08b0957fdbfbd16e908
                                  • Instruction Fuzzy Hash: 5B316D70E1025A9FDB55CF69D44069EF7B6BF89310F14851DE806EB340EB74AA86CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7cf1846c3c5ec5e77762ec076a7716c2c38017baa690354331e97059aafe3c17
                                  • Instruction ID: 9759f55f8d9991573ef3e5d2aabe0148c36dea399731ded53aef8eb85badcd10
                                  • Opcode Fuzzy Hash: 7cf1846c3c5ec5e77762ec076a7716c2c38017baa690354331e97059aafe3c17
                                  • Instruction Fuzzy Hash: 32216B31E10209DFDB19CFA5C45469EB7B2AF89310F10852EE852FB291DB75AA45CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 944ddef7eb5d229f97df8f1acf054f9cc34d55704c30e71785587e32c5dc34ba
                                  • Instruction ID: 40d79fcaecd7ea0854b4710740a19ef2e94ffeb2325f338d663156150a5a968d
                                  • Opcode Fuzzy Hash: 944ddef7eb5d229f97df8f1acf054f9cc34d55704c30e71785587e32c5dc34ba
                                  • Instruction Fuzzy Hash: 5A219F30F001199FDB94AA69E5542AEB7F6AB89220F14442DE409DB344EF35EE0187C4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bc0802be05712ebb4075e43a06c9fa785e241fa8fe736e93d8c57055ecca1692
                                  • Instruction ID: 6290981d471134d804a1c63da103bf38df2300585b20d3180cf6de8b0df78b50
                                  • Opcode Fuzzy Hash: bc0802be05712ebb4075e43a06c9fa785e241fa8fe736e93d8c57055ecca1692
                                  • Instruction Fuzzy Hash: BD213B30F10219CFDB94EBA4C5956EEB7B2AF89321F20802DD809EB255DB74EE41CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1b97f4e0f76541817842ec23f7d882cbd0814f853b55acafd892fa7cb43ea768
                                  • Instruction ID: 0c7b2cb12f9a4d9bedae2dc1306bd95093d7184015fdfbc69f2f8d09512df2a5
                                  • Opcode Fuzzy Hash: 1b97f4e0f76541817842ec23f7d882cbd0814f853b55acafd892fa7cb43ea768
                                  • Instruction Fuzzy Hash: 23212F31E10219DFDB58CFA5D44569EB7B2BF89310F10852EE812F7390DB75AA45CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 214ed59af72e920749229234aa18efb0ebfec99359f24073e293a21fa2449a65
                                  • Instruction ID: 4c98371ff07dda4ea8b88b5e12db20d541c01edaa3689aa277b650717298fce1
                                  • Opcode Fuzzy Hash: 214ed59af72e920749229234aa18efb0ebfec99359f24073e293a21fa2449a65
                                  • Instruction Fuzzy Hash: E611C231F141159FDB54AAB888666AF72EB9BC8360F10407DE50AE7344EE35DE0187D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef3843f50a05ff6f9c9f8e89bf14489e8b8663c91f2dbb72fe8faae0d90cba11
                                  • Instruction ID: aeef046fbe639218c425fcdbc2351fc2b1570217412fe3ee380817b7551ebb15
                                  • Opcode Fuzzy Hash: ef3843f50a05ff6f9c9f8e89bf14489e8b8663c91f2dbb72fe8faae0d90cba11
                                  • Instruction Fuzzy Hash: 29116A31E042058FDB60CEA9C881AAFBBB1EB85220F60496FD55DDB291D235DA42CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 97d3fdaaed7c2c48da18293a1aed22bceef5feb2d554b287733848864233495e
                                  • Instruction ID: 1cfda31fa5e28a463c42df158a60ea81d1fa6ea7e854681da6676f1caa315e2e
                                  • Opcode Fuzzy Hash: 97d3fdaaed7c2c48da18293a1aed22bceef5feb2d554b287733848864233495e
                                  • Instruction Fuzzy Hash: ED11A132B101115BDB95A9FD8C667AF72DB8BC8270F10053DE91AD3380EE25DE0047D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb2eba7430bd3afb705679226458e49cae72c82770e4676759b2ecbed3c8d63b
                                  • Instruction ID: 4a8c2071647b9b24182604da146329b33eee39388fedd9a829b7062ff857ce7e
                                  • Opcode Fuzzy Hash: bb2eba7430bd3afb705679226458e49cae72c82770e4676759b2ecbed3c8d63b
                                  • Instruction Fuzzy Hash: 53016632E182214BDF696FB544583AF77A79F801B0F21402EDA16E7540DA24DA05C3A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4c3dbd5898b89d7edb20067364400f73f20043a391111abffe30ad352ed5467
                                  • Instruction ID: 2c0db0ab1ce294d8904a869e85e3823f24a6754aff3035d39d53d265994d81e0
                                  • Opcode Fuzzy Hash: a4c3dbd5898b89d7edb20067364400f73f20043a391111abffe30ad352ed5467
                                  • Instruction Fuzzy Hash: 29116D31E0061C9FCBA8DFA9C9899DEB7F5EB48310F1044AED506E7310DA329A40DF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f5fa1146d5076edce32daacc2f99bd220dcc7b7410f0c2f5de7d8d047bff197
                                  • Instruction ID: e41f1af0dbf3f24d86d9a26c4a251fae7828607ba707d0d4d39dda12b8e9d1ff
                                  • Opcode Fuzzy Hash: 4f5fa1146d5076edce32daacc2f99bd220dcc7b7410f0c2f5de7d8d047bff197
                                  • Instruction Fuzzy Hash: 6E21A2B5D01219AFCB10CF9AD985ADEFBB8FB48724F10852AE518B7200C375A954CFE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 657177669a0e1e7ec1136b56d5a0fb661380ea4dca47a9a36f3a1a2500f96cd7
                                  • Instruction ID: 581480717d882b1b99ae1100365292a21c3b461d55812435319f4509acb962e9
                                  • Opcode Fuzzy Hash: 657177669a0e1e7ec1136b56d5a0fb661380ea4dca47a9a36f3a1a2500f96cd7
                                  • Instruction Fuzzy Hash: 8721C4B1D002199FCB10CF9AD988ADEFBB4FB48720F10856AE518B7200D374A954CBE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75202f466565faa5f6d07756eb1b070a9804aa0c81674f639cd44790ed9d7dfb
                                  • Instruction ID: e446106d0b46c7427585fc1477e0b8143c0168410b640e75ea1fc8da6f80992e
                                  • Opcode Fuzzy Hash: 75202f466565faa5f6d07756eb1b070a9804aa0c81674f639cd44790ed9d7dfb
                                  • Instruction Fuzzy Hash: A301A231B144214BDBA4D5AEA45272FB2DADBC9620F14843EF20EC7344ED69ED0243D5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 31909fc74686f5544648b025e9bcf7668c95713665e5e963a9a0636165a3ceb3
                                  • Instruction ID: 6750e3647c1549aeea4bf41b7571c5a1e4423f01711cc1cc0f25c6d3ac88081c
                                  • Opcode Fuzzy Hash: 31909fc74686f5544648b025e9bcf7668c95713665e5e963a9a0636165a3ceb3
                                  • Instruction Fuzzy Hash: A401D630B140214BDB64D5AE945272FB2DADBC9620F10843EE20EC7344ED69EC0243D5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa47fdebf34e21ed27f4b0be09e115394c234b029e414d721b8920a822b0263c
                                  • Instruction ID: 4ae159c4c89a29e011487d36c2dca9e4390f57ae18d12f8337e06b1bedbc82cd
                                  • Opcode Fuzzy Hash: aa47fdebf34e21ed27f4b0be09e115394c234b029e414d721b8920a822b0263c
                                  • Instruction Fuzzy Hash: 3B01B530A19249EFC741EFB8D49069DBBB1EF84700F5048AED5869B255EB346E04ABD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea0c034e3aa8ade168fad2bf27f235db3f72541d4cc13809c8e1f18e6b218cb1
                                  • Instruction ID: 28442ffa4622e08779c7baca701affdcfa78ee62c7b5ece904815fa317561280
                                  • Opcode Fuzzy Hash: ea0c034e3aa8ade168fad2bf27f235db3f72541d4cc13809c8e1f18e6b218cb1
                                  • Instruction Fuzzy Hash: BC014B35B00208CFDB14EB74D599B6D77B2EF88725F1040A8E5069B3A0DF35AD42CB41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6992226a504005bce3f577238151389f7cddc908d2fe15245e04e632bcea29be
                                  • Instruction ID: 13b5d9ffc62d412c478f8f4f7f07500077bbfa36a64eea1fad26c1a1a20c7cda
                                  • Opcode Fuzzy Hash: 6992226a504005bce3f577238151389f7cddc908d2fe15245e04e632bcea29be
                                  • Instruction Fuzzy Hash: 8CF08130A15209EFCB80EFB8E49469DBBB1EF84700F6049AD95869B254EF345F04ABD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.433423619.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_6cc0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8bd0873b70239a30ddb041d7d04abe74efd2c7b6de77ae9aadd5bde6c362baa
                                  • Instruction ID: df61d0a60450b01f283fbc93c5776b51d309ad6be302400d2ad002fe1b9b540c
                                  • Opcode Fuzzy Hash: a8bd0873b70239a30ddb041d7d04abe74efd2c7b6de77ae9aadd5bde6c362baa
                                  • Instruction Fuzzy Hash: 69E09231E15285AFCF51CAB489187AA7B69DF42228F2185EEE44ACB142E136DB02E351
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:17.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:237
                                  Total number of Limit Nodes:12
                                  execution_graph 39861 64dfbb8 DuplicateHandle 39862 64dfc4e 39861->39862 39592 f8051f 39594 f8044e 39592->39594 39593 f8051b 39594->39593 39598 f8102b 39594->39598 39608 f80f03 39594->39608 39618 f80f10 39594->39618 39599 f80f16 39598->39599 39600 f81020 39599->39600 39601 f8102b 6 API calls 39599->39601 39628 64a0448 39599->39628 39632 64a0560 39599->39632 39639 64a041f 39599->39639 39643 64dc298 39599->39643 39647 f811ef 39599->39647 39658 f810c8 39599->39658 39600->39594 39601->39599 39610 f80f16 39608->39610 39609 f81020 39609->39594 39610->39609 39611 f8102b 6 API calls 39610->39611 39612 64dc298 GetModuleHandleW 39610->39612 39613 64a0448 3 API calls 39610->39613 39614 64a041f 3 API calls 39610->39614 39615 64a0560 3 API calls 39610->39615 39616 f810c8 2 API calls 39610->39616 39617 f811ef 2 API calls 39610->39617 39611->39610 39612->39610 39613->39610 39614->39610 39615->39610 39616->39610 39617->39610 39620 f80f16 39618->39620 39619 f81020 39619->39594 39620->39619 39621 64a0448 3 API calls 39620->39621 39622 64a041f 3 API calls 39620->39622 39623 64a0560 3 API calls 39620->39623 39624 f810c8 2 API calls 39620->39624 39625 f811ef 2 API calls 39620->39625 39626 f8102b 6 API calls 39620->39626 39627 64dc298 GetModuleHandleW 39620->39627 39621->39620 39622->39620 39623->39620 39624->39620 39625->39620 39626->39620 39627->39620 39629 64a045e 39628->39629 39630 64a05d0 39629->39630 39666 64da6b7 39629->39666 39630->39599 39633 64a056a 39632->39633 39634 64a058a 39633->39634 39637 64d7d98 3 API calls 39633->39637 39712 64d7d89 39633->39712 39635 64a05d0 39634->39635 39638 64da6b7 3 API calls 39634->39638 39635->39599 39637->39634 39638->39635 39641 64a045e 39639->39641 39640 64a05d0 39640->39599 39641->39640 39642 64da6b7 3 API calls 39641->39642 39642->39640 39644 64dc2aa 39643->39644 39646 64dc325 39644->39646 39754 64dbf1c 39644->39754 39646->39599 39648 f8118c 39647->39648 39649 f810df 39648->39649 39653 f8f970 GetUserNameW 39648->39653 39654 f8f960 GetUserNameW 39648->39654 39650 f811ea 39649->39650 39657 f811ef 2 API calls 39649->39657 39827 f8f638 39649->39827 39832 f8f628 39649->39832 39837 f8f970 39649->39837 39842 f8f960 39649->39842 39650->39599 39653->39649 39654->39649 39657->39649 39659 f810df 39658->39659 39660 f811ea 39659->39660 39661 f8f638 GetUserNameW 39659->39661 39662 f8f628 GetUserNameW 39659->39662 39663 f811ef 2 API calls 39659->39663 39664 f8f970 GetUserNameW 39659->39664 39665 f8f960 GetUserNameW 39659->39665 39660->39599 39661->39659 39662->39659 39663->39659 39664->39659 39665->39659 39667 64da6c1 39666->39667 39670 64d7d98 39667->39670 39669 64da6cf 39669->39630 39672 64d7dad 39670->39672 39671 64d7ff8 39671->39669 39672->39671 39673 64d8359 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39673 39674 64d8399 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39674 39675 64d8361 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39675 39676 64d83a1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39676 39677 64d8389 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39677 39678 64d83c5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39678 39679 64d8385 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39679 39680 64d83c1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39680 39681 64d8381 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39681 39682 64d835d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39682 39683 64d839d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39683 39684 64d83ad GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39684 39685 64d8369 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39685 39686 64d83e9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39686 39687 64d83a9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39687 39688 64d8428 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39688 39689 64d8365 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39689 39690 64d83a5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39690 39691 64d83b5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39691 39692 64d8371 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39692 39693 64d83f1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39693 39694 64d83b1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39694 39695 64d83cd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39695 39696 64d838d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39696 39697 64d83c9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39697 39698 64d8418 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39698 39699 64d83d5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39699 39700 64d8395 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39700 39701 64d83d1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39701 39702 64d8391 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39702 39703 64d836d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39703 39704 64d83ed GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39704 39705 64d837d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39705 39706 64d83bd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39706 39707 64d8379 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39707 39708 64d83f9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39708 39709 64d83b9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39709 39710 64d8375 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39710 39711 64d83f5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39672->39711 39673->39672 39674->39672 39675->39672 39676->39672 39677->39672 39678->39672 39679->39672 39680->39672 39681->39672 39682->39672 39683->39672 39684->39672 39685->39672 39686->39672 39687->39672 39688->39672 39689->39672 39690->39672 39691->39672 39692->39672 39693->39672 39694->39672 39695->39672 39696->39672 39697->39672 39698->39672 39699->39672 39700->39672 39701->39672 39702->39672 39703->39672 39704->39672 39705->39672 39706->39672 39707->39672 39708->39672 39709->39672 39710->39672 39711->39672 39714 64d7d98 39712->39714 39713 64d7ff8 39713->39634 39714->39713 39715 64d8381 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39715 39716 64d835d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39716 39717 64d8428 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39717 39718 64d8365 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39718 39719 64d83cd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39719 39720 64d838d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39720 39721 64d83c9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39721 39722 64d8389 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39722 39723 64d83c5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39723 39724 64d8385 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39724 39725 64d83c1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39725 39726 64d8391 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39726 39727 64d836d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39727 39728 64d83ed GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39728 39729 64d83ad GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39729 39730 64d8369 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39730 39731 64d83e9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39731 39732 64d83a9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39732 39733 64d83b9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39733 39734 64d8375 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39734 39735 64d83f5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39735 39736 64d83b5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39736 39737 64d8371 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39737 39738 64d83f1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39738 39739 64d83b1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39739 39740 64d839d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39740 39741 64d8359 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39741 39742 64d8399 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39742 39743 64d8418 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39743 39744 64d83d5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39744 39745 64d8395 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39745 39746 64d83d1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39746 39747 64d83a5 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39747 39748 64d8361 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39748 39749 64d83a1 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39749 39750 64d837d GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39750 39751 64d83bd GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39751 39752 64d8379 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39752 39753 64d83f9 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39714->39753 39715->39714 39716->39714 39717->39714 39718->39714 39719->39714 39720->39714 39721->39714 39722->39714 39723->39714 39724->39714 39725->39714 39726->39714 39727->39714 39728->39714 39729->39714 39730->39714 39731->39714 39732->39714 39733->39714 39734->39714 39735->39714 39736->39714 39737->39714 39738->39714 39739->39714 39740->39714 39741->39714 39742->39714 39743->39714 39744->39714 39745->39714 39746->39714 39747->39714 39748->39714 39749->39714 39750->39714 39751->39714 39752->39714 39753->39714 39755 64dbf27 39754->39755 39759 64dc538 39755->39759 39771 64dc527 39755->39771 39756 64dc522 39756->39646 39760 64dc55a 39759->39760 39763 64dc663 39760->39763 39783 64dc134 39760->39783 39763->39756 39764 64dc7d0 39766 64dc7f9 39764->39766 39803 64dc144 39764->39803 39768 64dc134 GetModuleHandleW 39768->39764 39772 64dc538 39771->39772 39773 64dc134 GetModuleHandleW 39772->39773 39775 64dc663 39772->39775 39774 64dc7b4 39773->39774 39779 64dcb48 GetModuleHandleW 39774->39779 39780 64dc134 GetModuleHandleW 39774->39780 39781 64dcc40 GetModuleHandleW 39774->39781 39782 64dcc30 GetModuleHandleW 39774->39782 39775->39756 39776 64dc7d0 39777 64dc144 GetModuleHandleW 39776->39777 39778 64dc7f9 39776->39778 39777->39778 39779->39776 39780->39776 39781->39776 39782->39776 39784 64dc13f 39783->39784 39785 64dc7b4 39784->39785 39807 64dcda0 39784->39807 39817 64dcdb0 39784->39817 39785->39768 39788 64dcc30 39785->39788 39793 64dcc40 39785->39793 39798 64dcb48 39785->39798 39789 64dcc40 39788->39789 39790 64dccee 39789->39790 39791 64dcda0 GetModuleHandleW 39789->39791 39792 64dcdb0 GetModuleHandleW 39789->39792 39791->39790 39792->39790 39794 64dcc41 39793->39794 39795 64dccee 39794->39795 39796 64dcda0 GetModuleHandleW 39794->39796 39797 64dcdb0 GetModuleHandleW 39794->39797 39796->39795 39797->39795 39799 64dcb4b 39798->39799 39800 64dcb53 39799->39800 39801 64dcda0 GetModuleHandleW 39799->39801 39802 64dcdb0 GetModuleHandleW 39799->39802 39800->39764 39801->39800 39802->39800 39804 64dd0f0 GetModuleHandleW 39803->39804 39806 64dd165 39804->39806 39806->39766 39808 64dcdae 39807->39808 39809 64dc144 GetModuleHandleW 39808->39809 39811 64dcde9 39808->39811 39809->39811 39810 64dcfb4 39810->39785 39811->39810 39812 64dc144 GetModuleHandleW 39811->39812 39813 64dcf3a 39812->39813 39813->39810 39814 64dc144 GetModuleHandleW 39813->39814 39815 64dcf88 39814->39815 39815->39810 39816 64dc144 GetModuleHandleW 39815->39816 39816->39810 39818 64dcdc5 39817->39818 39819 64dc144 GetModuleHandleW 39818->39819 39820 64dcde9 39818->39820 39819->39820 39821 64dc144 GetModuleHandleW 39820->39821 39822 64dcfb4 39820->39822 39823 64dcf3a 39821->39823 39822->39785 39823->39822 39824 64dc144 GetModuleHandleW 39823->39824 39825 64dcf88 39824->39825 39825->39822 39826 64dc144 GetModuleHandleW 39825->39826 39826->39822 39828 f8f650 39827->39828 39829 f8f6af 39828->39829 39847 f8f1dc 39828->39847 39833 f8f650 39832->39833 39834 f8f1dc GetUserNameW 39833->39834 39836 f8f6af 39833->39836 39835 f8f6a1 39834->39835 39835->39649 39838 f8f988 39837->39838 39841 f8f9e6 39838->39841 39851 f8f1f4 GetUserNameW 39838->39851 39843 f8f988 39842->39843 39846 f8f9e6 39843->39846 39852 f8f1f4 GetUserNameW 39843->39852 39850 f8f770 GetUserNameW 39847->39850 39849 f8f8bd 39850->39849 39853 f85b90 39854 f85bae 39853->39854 39857 f85adc 39854->39857 39856 f85be5 39859 f876b0 LoadLibraryA 39857->39859 39860 f877a9 39859->39860 39863 64de0d0 39864 64de138 CreateWindowExW 39863->39864 39866 64de1f4 39864->39866
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 056cd98038314b726086a68dc9d23af761494c5eb287c5a23595aede274cd347
                                  • Instruction ID: 5d14ccf6c41dfd484ccd04693e84400536ccd141e2419f487df0633f431f4a95
                                  • Opcode Fuzzy Hash: 056cd98038314b726086a68dc9d23af761494c5eb287c5a23595aede274cd347
                                  • Instruction Fuzzy Hash: 0C334C31D10B199ECB11EF68C8946AEF7B1FF99300F14C79AE459A7211EB70AAC5CB41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 747 64ac7c0-64ac7dd 748 64ac7df-64ac7e2 747->748 749 64ac7ec-64ac7ef 748->749 750 64ac7e4-64ac7e9 748->750 751 64ac800-64ac803 749->751 752 64ac7f1-64ac7f5 749->752 750->749 755 64ac80b-64ac80e 751->755 756 64ac805-64ac806 751->756 753 64ac7fb 752->753 754 64ac991-64ac99e 752->754 753->751 757 64ac810-64ac820 755->757 758 64ac825-64ac828 755->758 756->755 757->758 759 64ac82a-64ac838 758->759 760 64ac847-64ac84a 758->760 766 64ac83f-64ac842 759->766 761 64ac84c-64ac855 760->761 762 64ac856-64ac859 760->762 764 64ac85b-64ac870 762->764 765 64ac875-64ac878 762->765 764->765 767 64ac87e-64ac881 765->767 768 64ac902-64ac908 765->768 766->760 770 64ac88d-64ac890 767->770 771 64ac883-64ac886 767->771 772 64ac90a 768->772 773 64ac892-64ac898 768->773 770->773 776 64ac8cb-64ac8ce 770->776 771->759 774 64ac888 771->774 775 64ac90f-64ac912 772->775 777 64ac89e-64ac8a9 773->777 778 64ac99f-64ac9cb 773->778 774->770 779 64ac92a-64ac92d 775->779 780 64ac914-64ac925 775->780 782 64ac8d0-64ac8d1 776->782 783 64ac8d6-64ac8d9 776->783 777->778 781 64ac8af-64ac8bc 777->781 794 64ac9d5-64ac9d8 778->794 787 64ac92f-64ac935 779->787 788 64ac93c-64ac93f 779->788 780->779 781->778 786 64ac8c2-64ac8c6 781->786 782->783 784 64ac8db-64ac8f8 783->784 785 64ac8fd-64ac900 783->785 784->785 785->768 785->775 786->776 787->782 793 64ac937 787->793 790 64ac95c-64ac95f 788->790 791 64ac941-64ac957 788->791 790->771 796 64ac965-64ac968 790->796 791->790 793->788 797 64ac9da-64ac9e4 794->797 798 64ac9e9-64ac9ec 794->798 800 64ac96a-64ac970 796->800 801 64ac975-64ac978 796->801 797->798 803 64ac9ee-64ac9f5 798->803 804 64ac9f6-64ac9f9 798->804 800->801 805 64ac97a-64ac97c 801->805 806 64ac97f-64ac981 801->806 808 64aca1b-64aca1e 804->808 809 64ac9fb-64ac9ff 804->809 805->806 810 64ac988-64ac98b 806->810 811 64ac983 806->811 814 64aca32-64aca35 808->814 815 64aca20-64aca27 808->815 812 64acac2-64acafc 809->812 813 64aca05-64aca0d 809->813 810->748 810->754 811->810 827 64acafe-64acb01 812->827 813->812 816 64aca13-64aca16 813->816 819 64aca53-64aca56 814->819 820 64aca37-64aca3b 814->820 817 64acaba-64acac1 815->817 818 64aca2d 815->818 816->808 818->814 822 64aca58-64aca5c 819->822 823 64aca70-64aca73 819->823 820->812 821 64aca41-64aca49 820->821 821->812 825 64aca4b-64aca4e 821->825 822->812 826 64aca5e-64aca66 822->826 828 64aca8b-64aca8e 823->828 829 64aca75-64aca86 823->829 825->819 826->812 830 64aca68-64aca6b 826->830 831 64acb19-64acb1c 827->831 832 64acb03-64acb16 827->832 833 64acaa8-64acaaa 828->833 834 64aca90-64aca94 828->834 829->828 830->823 836 64acb2a-64acb2d 831->836 837 64acb1e-64acb25 831->837 839 64acaac 833->839 840 64acab1-64acab4 833->840 834->812 838 64aca96-64aca9e 834->838 842 64acb2f-64acb46 836->842 843 64acb4d-64acb50 836->843 837->836 838->812 844 64acaa0-64acaa3 838->844 839->840 840->794 840->817 842->837 856 64acb48 842->856 845 64acb5e-64acb61 843->845 846 64acb52-64acb59 843->846 844->833 847 64acb63-64acb7a 845->847 848 64acb81-64acb84 845->848 846->845 847->832 865 64acb7c 847->865 850 64acba8-64acbab 848->850 851 64acb86-64acb9d 848->851 853 64acbdd-64acd81 850->853 854 64acbad-64acbb0 850->854 851->837 868 64acba3 851->868 902 64acebd-64aced0 853->902 903 64acd87-64acd8e 853->903 857 64acbb2-64acbc9 854->857 858 64acbd4-64acbd7 854->858 856->843 857->837 878 64acbcf 857->878 858->853 861 64aced3-64aced6 858->861 866 64acefa-64acefd 861->866 867 64aced8-64aceef 861->867 865->848 866->853 869 64acf03-64acf06 866->869 867->857 881 64acef5 867->881 868->850 871 64acf08-64acf0d 869->871 872 64acf10-64acf12 869->872 871->872 876 64acf19-64acf1c 872->876 877 64acf14 872->877 876->827 880 64acf22-64acf2b 876->880 877->876 878->858 881->866 904 64ace48-64ace4f 903->904 905 64acd94-64acdb7 903->905 904->902 906 64ace51-64ace84 904->906 914 64acdbf-64acdc7 905->914 918 64ace89-64aceb6 906->918 919 64ace86 906->919 915 64acdc9 914->915 916 64acdcc-64ace13 914->916 915->916 928 64ace2b-64ace3c 916->928 929 64ace15-64ace26 916->929 918->880 919->918 928->880 929->880
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-3993045852
                                  • Opcode ID: fc45ae3dc3c7d708a32aab2b4b9d02ba44ad191aa1169a9f8837a107a7e5f5e3
                                  • Instruction ID: 442836f6d738c77716e91099ab60cf190444e33f570a15fd1878e2d02dde7cb1
                                  • Opcode Fuzzy Hash: fc45ae3dc3c7d708a32aab2b4b9d02ba44ad191aa1169a9f8837a107a7e5f5e3
                                  • Instruction Fuzzy Hash: D5229F31F002089FDFA1DBA4C8806AFB7B2EF94310F14856AE41AEB351DA35DD45CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 029695a50f7bda5af4d752897bc702f0654065bdf1d111461394e662f67ce0af
                                  • Instruction ID: 40d9622f0faf7f0c7e25ea8903bc762707466a76f8178132d8b79ce229c00bdd
                                  • Opcode Fuzzy Hash: 029695a50f7bda5af4d752897bc702f0654065bdf1d111461394e662f67ce0af
                                  • Instruction Fuzzy Hash: 10131731D10B1A8ACB51EF68C894599F7B1FF99300F15D79AE458B7221EB70AAC4CF81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 31a66e223d459fc13619570f87cb3abed11b5549f6d05bbd6829ff253df7ed21
                                  • Instruction ID: 3c79b117721d756bbb2752f3acc0b554e86531b9bc2fa2d202719c7b763a3fac
                                  • Opcode Fuzzy Hash: 31a66e223d459fc13619570f87cb3abed11b5549f6d05bbd6829ff253df7ed21
                                  • Instruction Fuzzy Hash: C1E20671D10B1A8ECB51EF68C894699F7B1FF99300F15D69AE058B7221EB70AAC4CF41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d0f55f1d8ee0974484d57c9ab74f6da3579ff8eea27bd0f49de482bc851c9e50
                                  • Instruction ID: 74d903a50789405c45803a4ed0aceba474276969cc898b40e003854b3a18a1d6
                                  • Opcode Fuzzy Hash: d0f55f1d8ee0974484d57c9ab74f6da3579ff8eea27bd0f49de482bc851c9e50
                                  • Instruction Fuzzy Hash: 83423031E10719DFCB54EB75C8516DEB7B2AFD9300F5086AAE409AB250EF74A9C5CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 778216380cf320676388b868a2cb48c5fccc740ed33d91426e81075b1d6451b5
                                  • Instruction ID: e51ab2cb6730aab68c3a38aba0df2ff6a36abb0a91c4a45c48ae5a161fc844d2
                                  • Opcode Fuzzy Hash: 778216380cf320676388b868a2cb48c5fccc740ed33d91426e81075b1d6451b5
                                  • Instruction Fuzzy Hash: BE02B030F04215AFDB94EB74C8516AEB7E2AF84700F64846AE416DB395DF38ED46CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 97 64d9eb8-64d9ec3 98 64d9eed-64d9f0c call 64d8a28 97->98 99 64d9ec5-64d9eec call 64d3c70 97->99 105 64d9f0e-64d9f11 98->105 106 64d9f12-64d9f71 98->106 113 64d9f77-64da004 GlobalMemoryStatusEx 106->113 114 64d9f73-64d9f76 106->114 118 64da00d-64da035 113->118 119 64da006-64da00c 113->119 119->118
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 1
                                  • API String ID: 0-2212294583
                                  • Opcode ID: b2a32b870f2ef613efb04384034c2d86fd7a783a483db27c6897ca2c02cff8b2
                                  • Instruction ID: 17c5160e9968a47f14551b17d740018fa93ba9db88dea7578976df4bad0af8ce
                                  • Opcode Fuzzy Hash: b2a32b870f2ef613efb04384034c2d86fd7a783a483db27c6897ca2c02cff8b2
                                  • Instruction Fuzzy Hash: 5B410172E103559FCB11CFAAD8146EEBBF5EF89210F04856BE405A7240DB749885CBE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 122 f8f764-f8f7cf 124 f8f83a-f8f83e 122->124 125 f8f7d1-f8f7fc 122->125 126 f8f869-f8f874 124->126 127 f8f840-f8f863 124->127 134 f8f82c 125->134 135 f8f7fe-f8f800 125->135 128 f8f880-f8f8bb GetUserNameW 126->128 129 f8f876-f8f87e 126->129 127->126 132 f8f8bd-f8f8c3 128->132 133 f8f8c4-f8f8da 128->133 129->128 132->133 138 f8f8dc-f8f8e8 133->138 139 f8f8f0-f8f917 133->139 140 f8f831-f8f834 134->140 136 f8f822-f8f82a 135->136 137 f8f802-f8f80c 135->137 136->140 144 f8f80e 137->144 145 f8f810-f8f81e 137->145 138->139 146 f8f919-f8f91d 139->146 147 f8f927 139->147 140->124 144->145 145->145 148 f8f820 145->148 146->147 150 f8f91f 146->150 151 f8f928 147->151 148->136 150->147 151->151
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 00F8F8AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.648991316.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_f80000_ggh.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID: 1
                                  • API String ID: 2645101109-2212294583
                                  • Opcode ID: 0df17d907cf62563d874c895d77acff3138d0aa80c6216b4491ad269b5bc5f10
                                  • Instruction ID: 4c0318e2db165a980522f2ccc66f419b0e4d619d0a5e1bfbfe61c63a51fc8b3f
                                  • Opcode Fuzzy Hash: 0df17d907cf62563d874c895d77acff3138d0aa80c6216b4491ad269b5bc5f10
                                  • Instruction Fuzzy Hash: 05513370E002189FDB14DFA9D895BDDBBF1BF48310F15812AE815BB391D7B8A849CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 f8f1dc-f8f7cf 154 f8f83a-f8f83e 152->154 155 f8f7d1-f8f7fc 152->155 156 f8f869-f8f874 154->156 157 f8f840-f8f863 154->157 164 f8f82c 155->164 165 f8f7fe-f8f800 155->165 158 f8f880-f8f8bb GetUserNameW 156->158 159 f8f876-f8f87e 156->159 157->156 162 f8f8bd-f8f8c3 158->162 163 f8f8c4-f8f8da 158->163 159->158 162->163 168 f8f8dc-f8f8e8 163->168 169 f8f8f0-f8f917 163->169 170 f8f831-f8f834 164->170 166 f8f822-f8f82a 165->166 167 f8f802-f8f80c 165->167 166->170 174 f8f80e 167->174 175 f8f810-f8f81e 167->175 168->169 176 f8f919-f8f91d 169->176 177 f8f927 169->177 170->154 174->175 175->175 178 f8f820 175->178 176->177 180 f8f91f 176->180 181 f8f928 177->181 178->166 180->177 181->181
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 00F8F8AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.648991316.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_f80000_ggh.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID: 1
                                  • API String ID: 2645101109-2212294583
                                  • Opcode ID: d7f5d6afea6b2f27e3baca3bed41972b81773bb1a5527627dc4b3cb1f7e6b212
                                  • Instruction ID: 51578787820253d679c6cbda75502b6c175b5b66983e768596c690406bf8fdd4
                                  • Opcode Fuzzy Hash: d7f5d6afea6b2f27e3baca3bed41972b81773bb1a5527627dc4b3cb1f7e6b212
                                  • Instruction Fuzzy Hash: 42512370E002188FDB14DFA9C895BDDBBB1BF48310F148129E815AB391D778A844CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 182 f8f1f4-f8f7cf 184 f8f83a-f8f83e 182->184 185 f8f7d1-f8f7fc 182->185 186 f8f869-f8f874 184->186 187 f8f840-f8f863 184->187 194 f8f82c 185->194 195 f8f7fe-f8f800 185->195 188 f8f880-f8f8bb GetUserNameW 186->188 189 f8f876-f8f87e 186->189 187->186 192 f8f8bd-f8f8c3 188->192 193 f8f8c4-f8f8da 188->193 189->188 192->193 198 f8f8dc-f8f8e8 193->198 199 f8f8f0-f8f917 193->199 200 f8f831-f8f834 194->200 196 f8f822-f8f82a 195->196 197 f8f802-f8f80c 195->197 196->200 204 f8f80e 197->204 205 f8f810-f8f81e 197->205 198->199 206 f8f919-f8f91d 199->206 207 f8f927 199->207 200->184 204->205 205->205 208 f8f820 205->208 206->207 210 f8f91f 206->210 211 f8f928 207->211 208->196 210->207 211->211
                                  APIs
                                  • GetUserNameW.ADVAPI32(00000000,00000000), ref: 00F8F8AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.648991316.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_f80000_ggh.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID: 1
                                  • API String ID: 2645101109-2212294583
                                  • Opcode ID: a1ceb2b68f8f60d80942859faa531538233f668394f624eee485475bfeb39acd
                                  • Instruction ID: 81968dce1909aecad71a62dff94eae7ea047af7a38e4b31ccfd6a2d6904cc427
                                  • Opcode Fuzzy Hash: a1ceb2b68f8f60d80942859faa531538233f668394f624eee485475bfeb39acd
                                  • Instruction Fuzzy Hash: 6C511271E002188FDB14DFA9C895BDDBBB1BF48310F14812AE815AB391D7B8A849CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 212 64de0c4-64de136 213 64de138-64de13e 212->213 214 64de141-64de148 212->214 213->214 215 64de14a-64de150 214->215 216 64de153-64de18b 214->216 215->216 217 64de193-64de1f2 CreateWindowExW 216->217 218 64de1fb-64de233 217->218 219 64de1f4-64de1fa 217->219 223 64de235-64de238 218->223 224 64de240 218->224 219->218 223->224 225 64de241 224->225 225->225
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 064DE1E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: 1
                                  • API String ID: 716092398-2212294583
                                  • Opcode ID: 79ed18031e20870a2c04c740e6fd6df156ce40e14cefd2504f2af675532eb7e8
                                  • Instruction ID: 826d5cc0ce1c3932eb193307ac08589d173b333c5ca5fb373fbacdc21654986c
                                  • Opcode Fuzzy Hash: 79ed18031e20870a2c04c740e6fd6df156ce40e14cefd2504f2af675532eb7e8
                                  • Instruction Fuzzy Hash: F751C0B1D10309DFDB15CFA9D894ADEBFB5BF48350F24852AE819AB210D774A885CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 226 64de0d0-64de136 227 64de138-64de13e 226->227 228 64de141-64de148 226->228 227->228 229 64de14a-64de150 228->229 230 64de153-64de1f2 CreateWindowExW 228->230 229->230 232 64de1fb-64de233 230->232 233 64de1f4-64de1fa 230->233 237 64de235-64de238 232->237 238 64de240 232->238 233->232 237->238 239 64de241 238->239 239->239
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 064DE1E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID: 1
                                  • API String ID: 716092398-2212294583
                                  • Opcode ID: 15d012f607b9fb111a4ba0e0a80b4c84a5edd0cc1fc71fa93005decdda9c343e
                                  • Instruction ID: 315ebe85ca81e2f30a1aca05cc70d38cdb8c5abf9c9dd932bcaf5cf99c5df742
                                  • Opcode Fuzzy Hash: 15d012f607b9fb111a4ba0e0a80b4c84a5edd0cc1fc71fa93005decdda9c343e
                                  • Instruction Fuzzy Hash: 9241B1B1D00309DFDB15CF9AD894ADEBFB5BF48314F24852AE819AB210D774A985CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 240 f876a4-f87707 241 f87709-f8772e 240->241 242 f8775b-f877a7 LoadLibraryA 240->242 241->242 245 f87730-f87732 241->245 246 f877a9-f877af 242->246 247 f877b0-f877e1 242->247 248 f87734-f8773e 245->248 249 f87755-f87758 245->249 246->247 254 f877f1 247->254 255 f877e3-f877e7 247->255 251 f87740 248->251 252 f87742-f87751 248->252 249->242 251->252 252->252 257 f87753 252->257 258 f877f2 254->258 255->254 256 f877e9 255->256 256->254 257->249 258->258
                                  APIs
                                  • LoadLibraryA.KERNELBASE(?), ref: 00F87797
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.648991316.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_f80000_ggh.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: 1
                                  • API String ID: 1029625771-2212294583
                                  • Opcode ID: 4a03222fba73d864cdd69b6679f0c8836460934810db86c55b7e3517ec2a8907
                                  • Instruction ID: aa0a8fbb0c92059297ad22d547de61a942d83841800814d2ce7c40326e8acc79
                                  • Opcode Fuzzy Hash: 4a03222fba73d864cdd69b6679f0c8836460934810db86c55b7e3517ec2a8907
                                  • Instruction Fuzzy Hash: 584157B1D043088FDB10EFA9C9857DEBBF1AB48714F20852AE815E7254D7789882CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 259 f85adc-f87707 261 f87709-f8772e 259->261 262 f8775b-f877a7 LoadLibraryA 259->262 261->262 265 f87730-f87732 261->265 266 f877a9-f877af 262->266 267 f877b0-f877e1 262->267 268 f87734-f8773e 265->268 269 f87755-f87758 265->269 266->267 274 f877f1 267->274 275 f877e3-f877e7 267->275 271 f87740 268->271 272 f87742-f87751 268->272 269->262 271->272 272->272 277 f87753 272->277 278 f877f2 274->278 275->274 276 f877e9 275->276 276->274 277->269 278->278
                                  APIs
                                  • LoadLibraryA.KERNELBASE(?), ref: 00F87797
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.648991316.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_f80000_ggh.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: 1
                                  • API String ID: 1029625771-2212294583
                                  • Opcode ID: f938156545e7c1538ed35664373d665c75c409674bdee0cd49ea27fca4844501
                                  • Instruction ID: 4a59489fd0c94c9705e546d63c5d2ac6554fa5f1d75df31da38ba946828cd8d6
                                  • Opcode Fuzzy Hash: f938156545e7c1538ed35664373d665c75c409674bdee0cd49ea27fca4844501
                                  • Instruction Fuzzy Hash: 2B4168B0D043489FDB10EFA9C8847DEBBF1EB48714F20812AE815AB351D7B49881DF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 279 64dfbb0-64dfbb7 280 64dfbb8-64dfc4c DuplicateHandle 279->280 281 64dfc4e-64dfc54 280->281 282 64dfc55-64dfc72 280->282 281->282
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 064DFC3F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID: 1
                                  • API String ID: 3793708945-2212294583
                                  • Opcode ID: 125a75b6cf8e28e95fce74f7978640a1caa4b669bb551e206baa494501cb0a34
                                  • Instruction ID: f107b74c8a21ca1a3c0d52fe821d6140de623d3179891a33c4086524389cc1a2
                                  • Opcode Fuzzy Hash: 125a75b6cf8e28e95fce74f7978640a1caa4b669bb551e206baa494501cb0a34
                                  • Instruction Fuzzy Hash: FC21F4B5D00208AFCB10CFAAD984ADEBFF8EB48720F14841AE855A7310C374A944DFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 285 64dfbb8-64dfc4c DuplicateHandle 286 64dfc4e-64dfc54 285->286 287 64dfc55-64dfc72 285->287 286->287
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 064DFC3F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID: 1
                                  • API String ID: 3793708945-2212294583
                                  • Opcode ID: b88305531fdf5cf401542f3ab729cea44c1073c9285a9cb1858085abfae98d1f
                                  • Instruction ID: 04ac4374f0db168041e4d03d7ffafd9f5f392a33c3083fdddf12cad48a14d290
                                  • Opcode Fuzzy Hash: b88305531fdf5cf401542f3ab729cea44c1073c9285a9cb1858085abfae98d1f
                                  • Instruction Fuzzy Hash: F221F3B5D00209AFDB10CFAAD984ADEBFF8FB48720F14841AE955A7310D374A954DFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 290 64d9f88-64d9fce 292 64d9fd6-64da004 GlobalMemoryStatusEx 290->292 293 64da00d-64da035 292->293 294 64da006-64da00c 292->294 294->293
                                  APIs
                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,064D9F0A), ref: 064D9FF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID: 1
                                  • API String ID: 1890195054-2212294583
                                  • Opcode ID: 3c1a1afef0159b38818d32408c197b709e86472234ff768004c989983509fe90
                                  • Instruction ID: fc8436ef850cc7781c37e98a4cda1834d0fa49f1d15e1cd3f2b24a22f80b9c94
                                  • Opcode Fuzzy Hash: 3c1a1afef0159b38818d32408c197b709e86472234ff768004c989983509fe90
                                  • Instruction Fuzzy Hash: 9D1103B1C006599FCB10CF9AD844BDEFBB8EB48720F15856AE414B7240D378A985CFE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 297 64d8a28-64da004 GlobalMemoryStatusEx 300 64da00d-64da035 297->300 301 64da006-64da00c 297->301 301->300
                                  APIs
                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,064D9F0A), ref: 064D9FF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID: 1
                                  • API String ID: 1890195054-2212294583
                                  • Opcode ID: 57c227cc2f6a2b6c95da6c3753b1b4c2fcb37bb1efcc20556eb82a5cb740e3bc
                                  • Instruction ID: 7b017b52c04d92593b95df1cc66502958656755d94d9065a973ee8b0f56528f6
                                  • Opcode Fuzzy Hash: 57c227cc2f6a2b6c95da6c3753b1b4c2fcb37bb1efcc20556eb82a5cb740e3bc
                                  • Instruction Fuzzy Hash: 9F11F2B1D006599FCB10CF9AD9447DEBBF4EB48320F14816AE818B7240D378A945CFE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 304 64dc144-64dd130 306 64dd138-64dd163 GetModuleHandleW 304->306 307 64dd132-64dd135 304->307 308 64dd16c-64dd180 306->308 309 64dd165-64dd16b 306->309 307->306 309->308
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 064DD156
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660362184.00000000064D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64d0000_ggh.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: 1
                                  • API String ID: 4139908857-2212294583
                                  • Opcode ID: 1e3e8e44472e38e66af6c1d4b4772fe812b0711bdc0c28570c93cb058b079e94
                                  • Instruction ID: b9b196aa738063f9eb5794ea03722cde5edb0220264345868b7c0253d627d215
                                  • Opcode Fuzzy Hash: 1e3e8e44472e38e66af6c1d4b4772fe812b0711bdc0c28570c93cb058b079e94
                                  • Instruction Fuzzy Hash: 9611E2B1C002498FCB10CF9AD844BDEBBF4EF89214F10846AD859A7600C374A545CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: P@Gp
                                  • API String ID: 0-1978594688
                                  • Opcode ID: bfa92fb2442b41f65d2c3475f701cfc01ca7d639c78b66f427563e14863950ab
                                  • Instruction ID: a99c4f01787dbce134c66c73aa38be7b3bc838546345e3a3cbdb7854dd4d60ab
                                  • Opcode Fuzzy Hash: bfa92fb2442b41f65d2c3475f701cfc01ca7d639c78b66f427563e14863950ab
                                  • Instruction Fuzzy Hash: D1319F31B20200AFDB95AB74C82526F76E3AF99600F14846DE006DB391DF39DC46CBE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 1
                                  • API String ID: 0-2212294583
                                  • Opcode ID: b66dddbb7b55625d99cb00570008b398e092ff7c1618040d9ba5285f64140ec0
                                  • Instruction ID: 2a771ddfa1859d9a8bde903c7c44e0a4fcfd5d171772ff40f77b47b157bf0f9f
                                  • Opcode Fuzzy Hash: b66dddbb7b55625d99cb00570008b398e092ff7c1618040d9ba5285f64140ec0
                                  • Instruction Fuzzy Hash: 2121C4B1D00219AFCB40DF9AD884ADEFBB4FB49310F50852AE918B7240D374A994CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 1
                                  • API String ID: 0-2212294583
                                  • Opcode ID: 80d87816c11b4c27ac6b17a1022024ed37acc1fee6dd3f101a75e19bc3128ef2
                                  • Instruction ID: 213b1267d99d878c8af7af9361149b2eaec671673a443b651b2b43b02504ed06
                                  • Opcode Fuzzy Hash: 80d87816c11b4c27ac6b17a1022024ed37acc1fee6dd3f101a75e19bc3128ef2
                                  • Instruction Fuzzy Hash: 7D21CFB5D01219AFCB00CF9AD984ADEFBB8FB4C310F10852AE518B7200D374A694CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 69cbce13d15213f361ed84d9dfda5f48670a3a7b32e43f89d3f8328d05609371
                                  • Instruction ID: 655ffbfc34df658ae98f25f6405047a6bd9151a82e3308ff9a21090854f642b5
                                  • Opcode Fuzzy Hash: 69cbce13d15213f361ed84d9dfda5f48670a3a7b32e43f89d3f8328d05609371
                                  • Instruction Fuzzy Hash: 02922830E10304DFDBA4DF68C584A9EB7F2EB49314F5484AAE4099B396DB35EC85CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eccb90df58baab97343062d5b96fe559dfaaa1064f6dd5a7b568d570eb90d88f
                                  • Instruction ID: b9bef12d5a6bf993885b73507ac496a2f1c30b4693e54f579413b6baa8fccc2d
                                  • Opcode Fuzzy Hash: eccb90df58baab97343062d5b96fe559dfaaa1064f6dd5a7b568d570eb90d88f
                                  • Instruction Fuzzy Hash: 67328D70B10200EBCB957B78C45526E36E3EBC9750BA4086EE406CB351DF39ED46EBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81f0429e1beb917349206a64e824b7b81f7f664e91c02da1a4acca03be7c74af
                                  • Instruction ID: 15eaeb11f069ea99fda7d345fe629a4b6fd57c8069abc699ef26f24d340e56d6
                                  • Opcode Fuzzy Hash: 81f0429e1beb917349206a64e824b7b81f7f664e91c02da1a4acca03be7c74af
                                  • Instruction Fuzzy Hash: 6322BF30F00204AFDBA4EB68C4546AEB7F2AF94310F54846AE416DBB51DF35ED46DB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 84c95d32a91fb719c48d3be35b18f498a031ce1aade67cea08d0d78c46fdea78
                                  • Instruction ID: 8dfb7692b2a0e97b422a4951cd73b2a7813755bc8b74dc04f8c3c9e70a4b6a5d
                                  • Opcode Fuzzy Hash: 84c95d32a91fb719c48d3be35b18f498a031ce1aade67cea08d0d78c46fdea78
                                  • Instruction Fuzzy Hash: 5BF14D30F04308DFDB94EBB4C5516AEB7E2AF84700F60842AD41AAB395DF75AC46DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89c1dd888dde871d8283e86edbc17c3888811cf04dc1c1efa1545a4aafa2be2d
                                  • Instruction ID: 97286c28db4412f3f76f437390fc02687881d9f10098de7066de9c2b879f92d2
                                  • Opcode Fuzzy Hash: 89c1dd888dde871d8283e86edbc17c3888811cf04dc1c1efa1545a4aafa2be2d
                                  • Instruction Fuzzy Hash: 5DE18130B142049FDB96EF68D85566EBBF2AF89310F54446AE406DB351EF35EC41CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be2d9ed3b738c6c547246d4c3ebaa897afcb481e7008a41d85868a046df1ac9c
                                  • Instruction ID: cdd60fe3658fbb77ea427a734f0a458f9f8f313ee79c95ad6137922c3c5c12ab
                                  • Opcode Fuzzy Hash: be2d9ed3b738c6c547246d4c3ebaa897afcb481e7008a41d85868a046df1ac9c
                                  • Instruction Fuzzy Hash: 43D13F30B002149FDB94EBA8C855B6EB7F6BF89B00F208069E505EB3A1DF759D45DB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5588858be12d7f4ba6d89833f5b458bf38d3cde5cf8b7a54bce599cbbafa859a
                                  • Instruction ID: 2a0492559356500953a7501eb55eb18ecea0f2778840e96d294fcfd1527b9ccc
                                  • Opcode Fuzzy Hash: 5588858be12d7f4ba6d89833f5b458bf38d3cde5cf8b7a54bce599cbbafa859a
                                  • Instruction Fuzzy Hash: 4A914E70F102099FDB54EBA8C45176EB7E2AF99300F148529E40ADB385EF38EC428B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8308ac169a2311c5d899a99389cb88a1c68b2625c3df2cc9d87298205c6a895e
                                  • Instruction ID: 0309b313b3f7ee34aae79c8ead2ca0c3eb298b3673664b2c61aef590c5c59a80
                                  • Opcode Fuzzy Hash: 8308ac169a2311c5d899a99389cb88a1c68b2625c3df2cc9d87298205c6a895e
                                  • Instruction Fuzzy Hash: 51610671F101114BEB60AB7DC85066FB6EB9FD4620B25443AE80EDB361EF69EC0283D5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cef99f73618eddbcd74b44edf943cebcf3312cc27efe19ab266fa6356e88274a
                                  • Instruction ID: 40e77996d20dbab11fba3667813f8dcf68325dd32928276acdb73ad8a351a453
                                  • Opcode Fuzzy Hash: cef99f73618eddbcd74b44edf943cebcf3312cc27efe19ab266fa6356e88274a
                                  • Instruction Fuzzy Hash: EF813F30B102189FDB54EFA8C855B6EBAF6BF89B00F244169E505EB3A5DF759C41CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d854018c609259bf1824f0637949b62194c1602bbc8831ccb539f66ecaa977d4
                                  • Instruction ID: 264424d199cf5e2a14ac2792f9ea735f3923891ba1e94c528fa3bc09d3c44048
                                  • Opcode Fuzzy Hash: d854018c609259bf1824f0637949b62194c1602bbc8831ccb539f66ecaa977d4
                                  • Instruction Fuzzy Hash: E6913E30E10219DFDB60DF68C850B9DB7B1FF99300F20859AE549AB391DB75AE85CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 10d188d03442fc40731adb4abedc25372ad7505c3dad28c948df87c72e0d41e5
                                  • Instruction ID: 8cbda6301cf94fe2bd1ac25c7ebe5fd6315194c8f75b7e8a49010c80e9cbfd3c
                                  • Opcode Fuzzy Hash: 10d188d03442fc40731adb4abedc25372ad7505c3dad28c948df87c72e0d41e5
                                  • Instruction Fuzzy Hash: 3E913E30E10219DBDF60DF68C850B9DB7B1FF99700F20859AE549AB351DB71AA85CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14b95c7c908a2d9b847330d5221cc560ddf70e1d28ecb69616ccd0e609958d27
                                  • Instruction ID: 37014bd5f8e2918c50104d08dc7bc6b978853ef85b57d07317a9eb818c633273
                                  • Opcode Fuzzy Hash: 14b95c7c908a2d9b847330d5221cc560ddf70e1d28ecb69616ccd0e609958d27
                                  • Instruction Fuzzy Hash: 38618C70E00318DFDB54EBA8C9557AEB7F6BF84300F604429E41AAB795DB74AC41DB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3f23f827982fbbd96b1e0ccefece4aa856237d246edb549bb765dabc783e4a1
                                  • Instruction ID: ce1ff66ff1dcb812db32dc53480938a9e7e59b35437529289e7a52af29a1ce14
                                  • Opcode Fuzzy Hash: a3f23f827982fbbd96b1e0ccefece4aa856237d246edb549bb765dabc783e4a1
                                  • Instruction Fuzzy Hash: F751B570F102189FEF94ABA4C8157AEBAF6EB88710F24442EE105EB391DE749D01CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1776bb767afeca59d0971219405dd1804c39f13b5d3fd41dee0abd31e5298eb8
                                  • Instruction ID: 62c987522669d62324a0c0b764191c593b149212f065875353b7a4f731cf6ba3
                                  • Opcode Fuzzy Hash: 1776bb767afeca59d0971219405dd1804c39f13b5d3fd41dee0abd31e5298eb8
                                  • Instruction Fuzzy Hash: EC51B570F142459FDFA7AF68C88136FB7A2EB95214F60482FE50ACB341EA29DC458791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e08faae60c1ba2f8430c495232d01c687bec415e38f6b7018e9e33bba336f16e
                                  • Instruction ID: 843bf23fb4b858edc7e41da610fe932c56b7eaf3577430750cc5bc7b2ac54485
                                  • Opcode Fuzzy Hash: e08faae60c1ba2f8430c495232d01c687bec415e38f6b7018e9e33bba336f16e
                                  • Instruction Fuzzy Hash: E2518B71A00204DFDB55DF68E88069DFBB1FF88310F14C1AAE909DB356EB74A845CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba073ecbeb3aa212e10c462c34c42df91467b36ea43ffbdb4b2376f2d999485d
                                  • Instruction ID: 38b25adc05aaf1157568c449699ef8ccceed391417598f22983b204011d55a76
                                  • Opcode Fuzzy Hash: ba073ecbeb3aa212e10c462c34c42df91467b36ea43ffbdb4b2376f2d999485d
                                  • Instruction Fuzzy Hash: 11414D39A0070A9FDBA1DEA9C8C0AAFFBF1FB99310F10492BE155D7250D731A9458B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e6ac221e63f3c350a6d401bbc309205a075456670cd013938317ea27e4c264dd
                                  • Instruction ID: f7dff3ab353af4b78e6bce3885c8bb88fd194f35c82223d2ff19f5264a85d2b3
                                  • Opcode Fuzzy Hash: e6ac221e63f3c350a6d401bbc309205a075456670cd013938317ea27e4c264dd
                                  • Instruction Fuzzy Hash: D241B630B102189FEB54ABB4C82576E7AE7EF88710F24452DE505EB3D1DE748C02CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73c180b34cafb5a7e0d77c30d0f4126bde3a47cf369f4a6d1b9e82d9ca0f09f7
                                  • Instruction ID: 472ddc8ad7660c7c5625e684b1b29902844b313d368d30fcd3f8b0c5b3d156de
                                  • Opcode Fuzzy Hash: 73c180b34cafb5a7e0d77c30d0f4126bde3a47cf369f4a6d1b9e82d9ca0f09f7
                                  • Instruction Fuzzy Hash: 8341D670F042419FDFA79F68C89136FB762EB95210F60482FD50ACB381EA29DC458791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0fb21b8be4577f69b8d1050100b2084deec8a9f88ce48b64a9277179ce71f64f
                                  • Instruction ID: 2af1ce57cdc1afa216ab0dc065c87ac4aae3bdc8c22cbe1757ab1c26d563b8b6
                                  • Opcode Fuzzy Hash: 0fb21b8be4577f69b8d1050100b2084deec8a9f88ce48b64a9277179ce71f64f
                                  • Instruction Fuzzy Hash: 4E31C330E20309AFEB55CF64C45079EB7F1FF55704F24856AE801EB290DB74A942CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 844061f2e238773249955e070a757c34f740bf006711996e7437e0cd84ede733
                                  • Instruction ID: e2708f5d367a93f0b2aa90c65f7431706120cb427c8edac6f60ef6036831a62a
                                  • Opcode Fuzzy Hash: 844061f2e238773249955e070a757c34f740bf006711996e7437e0cd84ede733
                                  • Instruction Fuzzy Hash: E2316F30E20309EFEB55DBA4D85479EB7B2FF55B04F50852AE905EB340EB74A942CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7a2200aefb1e2bb5230d8eb1a7b770b377aab4502e709db9b7cf23c1dfeb7ad
                                  • Instruction ID: 51769ac5545a8055f7e344e90da6e358c9e3bc87cdba29e143fc7a180f89477c
                                  • Opcode Fuzzy Hash: e7a2200aefb1e2bb5230d8eb1a7b770b377aab4502e709db9b7cf23c1dfeb7ad
                                  • Instruction Fuzzy Hash: EE318E31E24705AFCB55DF64C49569EBBB2AF89310F60851AE856EB390DB70BC42CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea31de4502491b73625b0f22fd62f58dee1bef206490c99f0733aff9ff9541da
                                  • Instruction ID: 8a5212e6e9a8c3ffe5fbba5f66ca4c36fd036aae7f55fc96a3f98447dff1eed7
                                  • Opcode Fuzzy Hash: ea31de4502491b73625b0f22fd62f58dee1bef206490c99f0733aff9ff9541da
                                  • Instruction Fuzzy Hash: BA316B31E203059FCB59DF65C49569EBBB2BF89300F60851AE816EB340DB70BC42CB84
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 877c999d61ee49a1566745005f9ead1ee4a184bb9fa9af08ea0d319a8011972a
                                  • Instruction ID: 141bbd2ed5c7901da03d535841372feb27360136a477eef3ac839d775b5932a6
                                  • Opcode Fuzzy Hash: 877c999d61ee49a1566745005f9ead1ee4a184bb9fa9af08ea0d319a8011972a
                                  • Instruction Fuzzy Hash: B331C371F042549FEB84EFB989113EE77E1DB8C310F54802AE515E7381EE299D468BA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b9e8abffc403b6232e307d9bcbc0585a67868802d8a54795bcfe75b8a9f4c91e
                                  • Instruction ID: 9672cd27a2a9ed7eb4224a2b99fd6115dcb20a30ed250d2dd58755bfbf76f8da
                                  • Opcode Fuzzy Hash: b9e8abffc403b6232e307d9bcbc0585a67868802d8a54795bcfe75b8a9f4c91e
                                  • Instruction Fuzzy Hash: 2231BF71F04314AFDB90EBB989117EEB6E1EB48310F54802AE519E7381EA389D458BA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 935a203b7fc84968d80c7508ba9d886f59e8a9b2ea4e09f4eb395b383adf80de
                                  • Instruction ID: f0fef0569fda36cc4e3843f20c3512caaaa38d891fcb95dbe023377b3577ec4e
                                  • Opcode Fuzzy Hash: 935a203b7fc84968d80c7508ba9d886f59e8a9b2ea4e09f4eb395b383adf80de
                                  • Instruction Fuzzy Hash: FC31B430E1434AABCB56DF64C84079FFBB2AF8A310F54861AF845EB391DB70A941D790
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d9656e2315666166edf2220eec30fe4204eedea08d58e0276f4a795170af898e
                                  • Instruction ID: ad949fb050d889dbb3b5b35e765682a1a8387714494245f86525b8107310b499
                                  • Opcode Fuzzy Hash: d9656e2315666166edf2220eec30fe4204eedea08d58e0276f4a795170af898e
                                  • Instruction Fuzzy Hash: F131D471A142549FEB529F78CC14B9E7BF5AF89724F1481AAE401EB3E2EA718C44C790
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6ea317a31fee7f4a8c93a7624a164d9dde615549e4b3cb05e002d50baae2422
                                  • Instruction ID: d53bb84084b2aad255a91754eaff93ec3574c8d5e6bbb60e0db5edde93c5c795
                                  • Opcode Fuzzy Hash: f6ea317a31fee7f4a8c93a7624a164d9dde615549e4b3cb05e002d50baae2422
                                  • Instruction Fuzzy Hash: FF317131E1020AABDB5ADF64C48069FF7B2BF99300F64851AF805EB341EB70A945DBD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c26feeb5bd996ec2031a6937f9649e5434e2787ecada22c63e4ae2e25f436cc7
                                  • Instruction ID: 0bdfe467115c06ed0390257c1d978d94a499f6a387ca0bd5473138198d9fb298
                                  • Opcode Fuzzy Hash: c26feeb5bd996ec2031a6937f9649e5434e2787ecada22c63e4ae2e25f436cc7
                                  • Instruction Fuzzy Hash: 8E21DE30F04218AFDF94EA78E8502AEB7E3EB95210F14842AE419DB381EF25ED4197C4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a3d3cfa80d81b3ec258ddf839b2269783ec65b8edbf05202a36d246b77f1891
                                  • Instruction ID: c0a9d4bbc24b58e5fea4feee43d1aa6ff4742c64bd836b1ecc0911d1a35ca752
                                  • Opcode Fuzzy Hash: 7a3d3cfa80d81b3ec258ddf839b2269783ec65b8edbf05202a36d246b77f1891
                                  • Instruction Fuzzy Hash: C1215E31E10309EFDB09CBB5C5546AFB7B2AF99300F54851AE811EB350DBB1A986CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b9f55a7d630614332247c5cf25cb17bf0f3ad76c53bd85b2fc379b72e7bd4606
                                  • Instruction ID: d40ef651c8ab72f75d7c73d0472103e0c1c81c2a0a70d8518ef36071151074ed
                                  • Opcode Fuzzy Hash: b9f55a7d630614332247c5cf25cb17bf0f3ad76c53bd85b2fc379b72e7bd4606
                                  • Instruction Fuzzy Hash: 6D212A30E00308DFDB94EBA4DA516EEB7B2AF84301F64842AD829AB751DB74ED45DB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6ee220967685c54b05bdc5c5bc62d64243c309f85dd735b1d475289b28e5454b
                                  • Instruction ID: 32122aa8eb8d386b787db335addc8ace016d2d16a494c88f9a0db95e1c6dbeb5
                                  • Opcode Fuzzy Hash: 6ee220967685c54b05bdc5c5bc62d64243c309f85dd735b1d475289b28e5454b
                                  • Instruction Fuzzy Hash: A2214F31E10309DFDB19CFA5C54569FB7B2AF99300F54851AE811EB350DBB0A986CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 364fbd4ab4b7c64eef27522005a7aeba6b37df63357385f1d4637af00e7133c0
                                  • Instruction ID: b0b171f371bacbb64a285a5c01d0d4822d0a4ec976781f5975e4c68a567a4c2a
                                  • Opcode Fuzzy Hash: 364fbd4ab4b7c64eef27522005a7aeba6b37df63357385f1d4637af00e7133c0
                                  • Instruction Fuzzy Hash: 3A118232B14214AFDB95AAB888566BF77DBDBD8350F10407AE906E7340EE35DD018BD1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f587939239f1f1fdfc5f81258f39ae4716bd6506d960a2cfbc93938454ba4298
                                  • Instruction ID: 69357b0f9a7b3dc8fe23ca3ffc048f4375c93e62c758a61af005a3f3483d86f3
                                  • Opcode Fuzzy Hash: f587939239f1f1fdfc5f81258f39ae4716bd6506d960a2cfbc93938454ba4298
                                  • Instruction Fuzzy Hash: 5D116B32B183286F9BE52AB50C542EF779ADB901A0F50412AE905E7242DE14DD0EC3E2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a55bd9184823474951541d55861f60c35215e094f02ad710b84c6064bf2458d8
                                  • Instruction ID: 79af96d682efebf529b22bdab7a580511715dcb55f0f9e7eb4ac5b9c3cd3d05a
                                  • Opcode Fuzzy Hash: a55bd9184823474951541d55861f60c35215e094f02ad710b84c6064bf2458d8
                                  • Instruction Fuzzy Hash: AB11A930E003099FDBA18FA984C06ABBBB1FB45221F60496FC559DB381C2309841CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 10a1f7030f3d91af28e817935af20af909d57963611d2ddfd7432b9666d36a76
                                  • Instruction ID: 2794f01a838a62babad93c3a18827b98365e270a66688bd5a72d468621912af2
                                  • Opcode Fuzzy Hash: 10a1f7030f3d91af28e817935af20af909d57963611d2ddfd7432b9666d36a76
                                  • Instruction Fuzzy Hash: F801C072B04214ABEB55A6B84C123AF77DACBC82A0F10023AE91AD7380EE259D0147D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e04a680893038be0304e404c4c219bb2f5c6e7846d0e62cbc7f5a358ab5cded
                                  • Instruction ID: e5929569c2a55f9e5ea0d5cff6596f434cd73e101a7ed9c055e51f53b14620ea
                                  • Opcode Fuzzy Hash: 4e04a680893038be0304e404c4c219bb2f5c6e7846d0e62cbc7f5a358ab5cded
                                  • Instruction Fuzzy Hash: 4801D131B106105BDBA4916D9465B2FB7DADBC9A10F64883AF10ECB345ED69EC0243D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e79a02f2a83ae61a2a3be3b30e3a0aaab9c56608b70b81312b6ba71d1c73ed45
                                  • Instruction ID: c08b431139a5c0515840fb56ca79c4abf13747ad0b6c414bdd20f1672c2dadc6
                                  • Opcode Fuzzy Hash: e79a02f2a83ae61a2a3be3b30e3a0aaab9c56608b70b81312b6ba71d1c73ed45
                                  • Instruction Fuzzy Hash: 0001F431B106105BDBA4916DD465B2FB7DADBC9A10F64883BF10ECB345ED69EC0243D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 618d459f3d417c100c7c6b1e752e592851b3d17fea875125dbbd2d2d664eb50b
                                  • Instruction ID: 629e9d50a5ecd846ce9c83b3ecebd3c6e4b427cc9a1c2c19e6dbbbff4cd68462
                                  • Opcode Fuzzy Hash: 618d459f3d417c100c7c6b1e752e592851b3d17fea875125dbbd2d2d664eb50b
                                  • Instruction Fuzzy Hash: A301B530A18249DFC740FFB8D4A159D7BB19F80700F50489D95899F256EB341E04ABD5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95189f7a652e05d1c167906348c9f9d32d1c9d57acb19d77dc6b69d8a2927f7b
                                  • Instruction ID: 24184212eb96192f209bf6e565aadcb6a2737cd70ea28389b3abfa83e072c88b
                                  • Opcode Fuzzy Hash: 95189f7a652e05d1c167906348c9f9d32d1c9d57acb19d77dc6b69d8a2927f7b
                                  • Instruction Fuzzy Hash: D3014B75B00208CFDB04EB74D899B6D77B2EF89715F504069E5069B3A0DF34AC42CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7ef757445ff95d50e99fb170420928b9f74ae73ed262c843a384c4cb9e5eebb
                                  • Instruction ID: a70b54e44b14dbc9b46e8aaf9d4529302d9510a160df3b83bccabd341ac2b42a
                                  • Opcode Fuzzy Hash: e7ef757445ff95d50e99fb170420928b9f74ae73ed262c843a384c4cb9e5eebb
                                  • Instruction Fuzzy Hash: 81F08630A14149EFC740FFB8D49199D77B1AF80700F9048AD95899F255DF342E04BB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000004.00000002.660226182.00000000064A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_64a0000_ggh.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95a448107d449e4cf5408b901374a920756502b1c1855e46c6e79a90934dd945
                                  • Instruction ID: a75248f0587855b2eb4c872cb40847473c50c7161c6a5220bbd242e5ba8f2b4d
                                  • Opcode Fuzzy Hash: 95a448107d449e4cf5408b901374a920756502b1c1855e46c6e79a90934dd945
                                  • Instruction Fuzzy Hash: 43F06D35E19289AEDB52CFB489586AABF69DF56208F2445EBD449CB242E131CD019350
                                  Uniqueness

                                  Uniqueness Score: -1.00%